This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Trojan 1337 targets the website of A.R.B Surgical
- Category: Defacement
- Content: The group claims to have defaced the website of A.R.B SurgicalProof: https://ownzyou.com/zone/276349
- Date: 2025-11-05T23:47:59Z
- Network: telegram
- Published URL: (https://t.me/c/2805167925/82) Screenshots: https://d34iuop8pidsy8.cloudfront.net/e9692ede-66dc-4dfe-bd44-47600473951f.png
- Threat Actors: Trojan 1337
- Victim Country: Bangladesh
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: a.r.b surgical
- Victim Site: arbdrug.com
- Alleged data breach of Universidad de Lima
- Category: Data Breach
- Content: The threat actor claims to be selling over 8,400 student psychological evaluations in PDF format allegedly obtained from the Universidad de Lima in Peru. The data is described as recent and written in Spanish, containing sensitive psychological assessment details of students
- Date: 2025-11-05T23:17:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-8000-Student-Psycological-Evaluations) Screenshots: https://d34iuop8pidsy8.cloudfront.net/58ecb946-ac7e-4d45-83ed-51d623155721.png
- Threat Actors: juliusdeane
- Victim Country: Peru
- Victim Industry: Education
- Victim Organization: universidad de lima
- Victim Site: ulima.edu.pe
- Oscars Group falls victim to MEDUSA ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and intends to publish it within 24-25 days.
- Date: 2025-11-05T22:51:58Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=75713650840e038d0578707308e19d2c) Screenshots: https://d34iuop8pidsy8.cloudfront.net/aa3d65e0-2f29-41a7-bd0c-1be3f2ef2e99.png
- Threat Actors: MEDUSA
- Victim Country: Australia
- Victim Industry: Hospitality & Tourism
- Victim Organization: oscars group
- Victim Site: oscarsgroup.com.au
- LaRosa’s Pizzeria, Inc. falls victim to MEDUSA ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and intends to publish it within 17-18 days.Note: LaRosa’s Pizzeria, Inc. has previously fallen victim to Qilin Ransomware on Oct 14, 2025.
- Date: 2025-11-05T22:48:11Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=63a36fe98816513a0d32671b200c1c2f) Screenshots: https://d34iuop8pidsy8.cloudfront.net/27214688-4cc2-4f0c-82f5-8c7dfc75c4ba.png
- Threat Actors: MEDUSA
- Victim Country: USA
- Victim Industry: Restaurants
- Victim Organization: larosa’s pizzeria, inc.
- Victim Site: larosas.com
- Alleged data sale of Unidentified real estate firm from USA.
- Category: Data Breach
- Content: Threat actor claims to be selling stolen identity documents and PII allegedly from an unidentified real estate firm from USA. the compromised data reportedly includes Name, DOB, Address, SSN, Passport, Driving License, Bank Statements, and Credit Check Reports.
- Date: 2025-11-05T22:34:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-FRESH-USA-Passports-SSN-Driving-Licenses-For-Sale-w-Credit-Checks-Bank-State) Screenshots: https://d34iuop8pidsy8.cloudfront.net/3334ee92-6719-4330-83ae-bb5cc6a034a5.png
- Threat Actors: shellrunners
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of China Real Estate Listings Data
- Category: Data Breach
- Content: Threat actor claims to be selling leaked real estate listings data from China. The compromised data reportedly contains over 1 million records including Uuid , id, name, address, tel, name, etc.
- Date: 2025-11-05T22:23:46Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-1M-China-Real-Estate-Listings-Data-Leak-Comprehensive-Dataset-with-Detailed-Proper) Screenshots: https://d34iuop8pidsy8.cloudfront.net/680e50d3-6bfa-4662-974c-0bb309512bdc.png
- Threat Actors: gtaviispeak
- Victim Country: China
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Andreani
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Andreani, The compromised dataset allegedly contains user account records, shipment operations, branch event logs, route timings, and branch performance data. It reportedly includes around 893k user records, 3.5M shipment rows, and other operational datasets in JSON and SQLite formats.
- Date: 2025-11-05T22:18:56Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Andreani-Logistics—Operational-Dataset) Screenshots: https://d34iuop8pidsy8.cloudfront.net/9edb5fec-8089-458f-9086-79ae2ad4a588.png
- Threat Actors: delitospenales
- Victim Country: Argentina
- Victim Industry: Transportation & Logistics
- Victim Organization: andreani
- Victim Site: andreani.com.ar
- Alleged sale of access to VoIP PBX system of Elektro Alfons
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized admin panel access to VoIP PBX system of Elektro Alfons, Austria.
- Date: 2025-11-05T22:13:06Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Admin-Access-to-Elektro-Alfons-VoIp-PBX-in-Austria) Screenshots: https://d34iuop8pidsy8.cloudfront.net/5dff1c35-c8e1-430a-a838-b5bf54b4de6c.png
- Threat Actors: exploitu4ever
- Victim Country: Austria
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: elektro alfons
- Victim Site: elektro-alfons.at
- Alleged breach of deutsche bank database
- Category: Data Breach
- Content: The threat actor claims to have breached the deutsche bank database.
- Date: 2025-11-05T22:09:25Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/deusche-ban1-db-avilable-on-priva1e-channe1-to-b0y-acces-dm-telgram.45333/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/f9a3ccc2-a675-4cf4-9dbf-9b10fc6b9b4f.png
- Threat Actors: Cayenne22
- Victim Country: Germany
- Victim Industry: Banking & Mortgage
- Victim Organization: deutsche bank
- Victim Site: db.com
- Alleged leak of UK database
- Category: Data Breach
- Content: The threat actor claims to have leaked databases from the UK, which are available on a private channel.
- Date: 2025-11-05T21:02:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-%F0%9F%87%AC%F0%9F%87%A7UK-DBs-avilable-on-private-channel) Screenshots: https://d34iuop8pidsy8.cloudfront.net/1bda2a49-058e-41cc-a4b2-0df4a3f383da.png
- Threat Actors: Mamy22
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of 1,045 Spanish credit-card records
- Category: Data Breach
- Content: The threat actor claims to have offered 1,045 credit-card records from Spain, originally sold through a marketplace referred to as patrick. The dataset was initially reported to have an 87% validity rate, which allegedly declined to 30% after three days due to unknown reasons.
- Date: 2025-11-05T21:00:49Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/269707/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/fc5a5e9d-b446-48cc-849b-aac6de939481.png
- Threat Actors: Abrahas
- Victim Country: Spain
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of RELIV in Ecuador.
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly stolen from Reliv, a healthcare company based in Ecuador. The compromised data reportedly contains over 100GB of unreleased medical records, including x-rays, diagnostic reports, and digital signatures.
- Date: 2025-11-05T20:56:10Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-RELIV-Over-100GB-of-medical-documents-from-an-Ecuadorian-health-company) Screenshots: https://d34iuop8pidsy8.cloudfront.net/ea383bf1-3e06-407d-8247-0bf673497575.png
- Threat Actors: juliusdeane
- Victim Country: Ecuador
- Victim Industry: Hospital & Health Care
- Victim Organization: reliv
- Victim Site: reliv.la
- Alleged sale of 2,000 US credit-card records
- Category: Data Breach
- Content: The threat actor claims to be selling 2,000 US credit-card records. . The compromised dataset reportedly contains name, city, address, phone, etc.
- Date: 2025-11-05T20:53:21Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/269708/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/69e8032f-17ea-41c1-bcbb-75f6790bc386.png
- Threat Actors: Cleaner
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged breach of Louis Vuitton database
- Category: Data Breach
- Content: The threat actor claims to have breached Louis Vuitton’s database
- Date: 2025-11-05T20:40:43Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/louis-vuiton-db-avilable-2025-10-db-avilable-on-priva1e-channe1-to-b0y-acces-dm-telgram.45322/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/501f1744-695c-4c63-b0ea-87800c3e2b67.png
- Threat Actors: yees0987
- Victim Country: France
- Victim Industry: Luxury Goods & Jewelry
- Victim Organization: louis vuitton
- Victim Site: louisvuitton.com
- Francehopital falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-11-05T20:37:24Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ca053662-c585-3039-9251-005bceff3718) Screenshots: https://d34iuop8pidsy8.cloudfront.net/d996ef3f-9b33-4be7-924b-c7aa40d5c134.png
- Threat Actors: Qilin
- Victim Country: France
- Victim Industry: Medical Equipment Manufacturing
- Victim Organization: francehopital
- Victim Site: francehopital.com
- Alleged leak of user credentials of HOSTRY
- Category: Initial Access
- Content: Threat actor claims to have leaked user credentials of HOSTRY.
- Date: 2025-11-05T20:33:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-hostry-com-Host-User-Access) Screenshots: https://d34iuop8pidsy8.cloudfront.net/362793f2-4739-4b27-a393-05d91fc2fd46.png
- Threat Actors: Robert2025
- Victim Country: Cyprus
- Victim Industry: Unknown
- Victim Organization: hostry
- Victim Site: hostry.com
- Alleged sale of EU credit-card records
- Category: Data Breach
- Content: The threat actor claims to be selling 1,400 mixed European credit-card records from multiple countries. The compromised dataset reportedly contains card details and billing information including full name, state, city, email, and other personal data.
- Date: 2025-11-05T20:21:30Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/269703/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/268da1c1-c687-48dd-bc29-f078cd2a2372.png
- Threat Actors: Vino
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of SUSCO Public Company Limited
- Category: Data Breach
- Content: The threat actor claims to be selling data from SUSCO Public Company Limited
- Date: 2025-11-05T20:01:56Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-SUSCO-Thailand-internal-data-access-for-sale) Screenshots: https://d34iuop8pidsy8.cloudfront.net/aab31bad-d8d3-4974-a3a5-5880218e6f1d.png
- Threat Actors: KaruHunters
- Victim Country: Thailand
- Victim Industry: Retail Industry
- Victim Organization: susco public company limited
- Victim Site: susco.co.th
- Alleged data breach of RELIV in Ecuador.
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly stolen from Reliv, a healthcare company based in Ecuador. The compromised data reportedly amounts to over 100GB of unreleased medical records, including x-rays, diagnostic reports, and digital signatures.
- Date: 2025-11-05T19:25:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-RELIV-Over-100GB-of-medical-documents-from-an-Ecuadorian-health-company) Screenshots: https://d34iuop8pidsy8.cloudfront.net/ea383bf1-3e06-407d-8247-0bf673497575.png
- Threat Actors: juliusdeane
- Victim Country: Ecuador
- Victim Industry: Health & Fitness
- Victim Organization: reliv
- Victim Site: Unknown
- Hider_Nex claims to target Romania
- Category: Alert
- Content: A recent post by the group indicates that they’re targeting Romania.
- Date: 2025-11-05T19:06:52Z
- Network: telegram
- Published URL: (https://t.me/c/2878397916/125) Screenshots: https://d34iuop8pidsy8.cloudfront.net/6b18f682-3298-43dc-afc0-d979a08b1ed3.png
- Threat Actors: Hider_Nex
- Victim Country: Romania
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Registro Público Vehicular (REPUVE)
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly stolen from Registro Público Vehicular (REPUVE) of Mexico. The compromised dataset reportedly contains information on approximately 1.7 million vehicle records, including full names, full addresses, RFC numbers, vehicle plates, vehicle serial numbers, vehicle colors, and phone numbers, among other sensitive data
- Date: 2025-11-05T18:58:49Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-REPUVE-MEXICO-1-700-000-LINES) Screenshots: https://d34iuop8pidsy8.cloudfront.net/7b3697dd-220c-46b6-a25f-7893214bd743.png
- Threat Actors: Eternal
- Victim Country: Mexico
- Victim Industry: Automotive
- Victim Organization: registro público vehicular (repuve)
- Victim Site: repuve.gob.mx
- Alleged unauthorized admin access to Yental
- Category: Initial Access
- Content: The threat actor claims to have obtained unauthorized admin access to Yental.
- Date: 2025-11-05T18:54:14Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-INDIAN-Website-yental-auramatics-com-Admin-Access) Screenshots: https://d34iuop8pidsy8.cloudfront.net/188129af-1802-4fb3-a9fb-783bb2b3a36b.png
- Threat Actors: crazyboy68
- Victim Country: India
- Victim Industry: E-commerce & Online Stores
- Victim Organization: yental
- Victim Site: yental.auramatics.com
- Alleged sale of Canadian credit-card records
- Category: Data Breach
- Content: The threat actor claims to be selling Canadian credit-card records
- Date: 2025-11-05T18:33:14Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/269701/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/4bfdf465-0f48-42b5-be06-e13fa63ad437.png
- Threat Actors: Nickjonson899
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Oxford University Clinical Research Unit falls victim to DEVMAN 2.0 Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 120 GB of the organization’s data and intends to publish them within 2-3 days.
- Date: 2025-11-05T18:01:54Z
- Network: tor
- Published URL: (http://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/94e591fa-770e-4775-ac0d-b7c1b63092c6.png
- Threat Actors: DEVMAN 2.0
- Victim Country: Vietnam
- Victim Industry: Research Industry
- Victim Organization: oxford university clinical research unit
- Victim Site: oucru.org
- Alleged access to Bank Hapoalim
- Category: Initial Access
- Content: Group claims to have access to the Bank Hapoalim.
- Date: 2025-11-05T17:48:37Z
- Network: telegram
- Published URL: (https://t.me/c/2875163062/212) Screenshots: https://d34iuop8pidsy8.cloudfront.net/d99834a6-491b-4904-b5db-6e8bde8c1c5a.png
- Threat Actors: RipperSec
- Victim Country: Israel
- Victim Industry: Financial Services
- Victim Organization: bank hapoalim
- Victim Site: bankhapoalim.co.il
- Alleged data sale of Rosneft Oil Company
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing personal information of shareholders of Rosneft Oil Company from 2013. The exposed dataset reportedly includes shareholder names, individual payout amounts, etc.
- Date: 2025-11-05T17:41:05Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-ROSNEFT-shareholders) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c4b376f6-7bbf-4792-b2b1-039df82d392e.png
- Threat Actors: MonteCristo
- Victim Country: Russia
- Victim Industry: Oil & Gas
- Victim Organization: rosneft oil company
- Victim Site: rosneft.com
- KISS FM falls victim to RHYSIDA ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and intends to publish it within 6 to 7 days.
- Date: 2025-11-05T16:50:36Z
- Network: tor
- Published URL: (http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c698e423-9dfe-4654-b08e-9bf4a193a90e.png
- Threat Actors: RHYSIDA
- Victim Country: Spain
- Victim Industry: Broadcast Media
- Victim Organization: kiss fm
- Victim Site: kissfm.es
- Alleged sale of China database
- Category: Data Breach
- Content: The threat actor claims to be selling China database.
- Date: 2025-11-05T16:35:34Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/china-db-avilable-on-priva1e-channe1-just-dm-on-telegram.45301/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/81a51fa3-5757-40c4-bc80-31cab3f420d4.png
- Threat Actors: Cayenne22
- Victim Country: China
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Oelbaum & Kagan Dentistry falls victim to INC RANSOM ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-05T16:15:52Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/690b5a22e1a4e4b3ff1aba6e) Screenshots: https://d34iuop8pidsy8.cloudfront.net/fcebf7a2-4cf7-4ba3-81a8-979a9b19f9bb.png
- Threat Actors: INC RANSOM
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: oelbaum & kagan dentistry
- Victim Site: sensationalteeth.com
- Alleged sale of 600 mixed credit-card records
- Category: Data Breach
- Content: The threat actor claims to be selling a set of approximately 600 mixed credit-card records obtained via sniffing. The compromised data includes IP address, user-agent, card number, expiry, and CVV; many records also include billing address, ZIP, and city; some include phone, email, and date of birth.
- Date: 2025-11-05T16:03:39Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/269687/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/d12165d1-b676-42f6-8625-fda4f129790f.png
- Threat Actors: RichAsHell
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Shelbyville Police Department falls victim to INTERLOCK Ransomware
- Category: Ransomware
- Content: The group claims to have obtained over 208 GB of the organizations data.
- Date: 2025-11-05T15:58:11Z
- Network: tor
- Published URL: (http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/leaks.php) Screenshots: https://d34iuop8pidsy8.cloudfront.net/292a9856-4ab8-46bd-8b25-b430bbc89499.png
- Threat Actors: INTERLOCK
- Victim Country: USA
- Victim Industry: Government & Public Sector
- Victim Organization: shelbyville police department
- Victim Site: shelbyvillepolice.com
- Alleged sale of Georgia mobile number database
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing mobile phone numbers of users in Georgia.
- Date: 2025-11-05T15:55:19Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/georgia-mobile-number-data.45296/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/bb0c29a1-8c11-48d5-b1ff-14ca31fd72d5.png
- Threat Actors: misor65602
- Victim Country: Georgia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of France mobile number database
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing mobile phone numbers of individuals in France.
- Date: 2025-11-05T15:47:01Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/france-mobile-number-data.45295/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/253f396a-55d8-4106-92b7-46c49cb5e3d1.png
- Threat Actors: gigaros623
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Next Pharmaceutical
- Category: Data Breach
- Content: Group claims to have obtained 24 GB of organization’s data. The compromised data includes company name, bank accounts, private emails, passwords and other sensitive document.
- Date: 2025-11-05T15:25:07Z
- Network: telegram
- Published URL: (https://t.me/IndianCyberForceTG/3) Screenshots: https://d34iuop8pidsy8.cloudfront.net/764359d3-5b13-481c-b386-dcfa065d9b97.png
- Threat Actors: INDIAN CYBER FORCE
- Victim Country: Pakistan
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: next pharmaceutical
- Victim Site: nextpharmaceutical.com
- Alleged sale of Finland mobile number database
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing mobile phone numbers of users in Finland.
- Date: 2025-11-05T15:22:48Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/finland-mobile-number-data.45294/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/e208a07e-db95-4546-a1a0-e237ac70c5d5.png
- Threat Actors: tefak81793
- Victim Country: Finland
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Fiji mobile number database
- Category: Data Breach
- Content: The threat actor claims to be selling a database of mobile phone numbers from Fiji.
- Date: 2025-11-05T15:17:44Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/fiji-mobile-number-data.45293/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/70981f6b-6b97-4a5a-ad0b-fbefc572f8b2.png
- Threat Actors: saxawe1742
- Victim Country: Fiji
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Ethiopia mobile number database
- Category: Data Breach
- Content: A threat actor claims to be selling a database of mobile phone numbers from Ethiopia.
- Date: 2025-11-05T15:14:16Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/ethopia-mobile-number-data.45292/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/e3f80d03-34ef-4b42-8a5c-703e5ecbef29.png
- Threat Actors: jigos11180
- Victim Country: Ethiopia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- The Fence People falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 23 GB of the organization’s data. The compromised information reportedly includes employee documents (such as passports, driver’s licenses, and other personal details), financial data, confidential files, and customer information, among other sensitive materials.
- Date: 2025-11-05T15:11:03Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/b21654df-7733-4f3b-aef6-4dee38ffa984.png
- Threat Actors: akira
- Victim Country: Canada
- Victim Industry: Building and construction
- Victim Organization: the fence people
- Victim Site: thefencepeople.com
- Alleged sale of 10 TB global document database
- Category: Data Breach
- Content: The threat actor claims to be selling 10 TB database allegedly containing documents from various countries worldwide.
- Date: 2025-11-05T14:51:33Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/full-docs-all-world.45287/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/d90b1bd2-dd91-459e-b577-6f8145f3cf7a.png
- Threat Actors: Alla090
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Nobu Restaurants falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained 71 GB of the organization’s data. The compromised data includes employee information, owners information such as passports, driver licenses, SSN, detailed financials, confidential files, NDA, etc.
- Date: 2025-11-05T14:33:53Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/ac239617-3246-4694-aadb-00799b2df0c0.jpg
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Restaurants
- Victim Organization: nobu restaurants
- Victim Site: noburestaurants.com
- Z-BL4CX-H4T targets the website of Software and Apps of Colombia SAS
- Category: Defacement
- Content: The group claims to have defaced the website of Software and Apps of Colombia SAS.
- Date: 2025-11-05T14:29:24Z
- Network: telegram
- Published URL: (https://t.me/c/3027611821/130) Screenshots: https://d34iuop8pidsy8.cloudfront.net/49980a6b-dc90-486e-85e5-6531d257bd0d.png https://d34iuop8pidsy8.cloudfront.net/51bb9b36-fea2-4d31-9ad4-b1efe637baf2.png
- Threat Actors: Z-BL4CX-H4T
- Victim Country: Colombia
- Victim Industry: Software Development
- Victim Organization: software and apps of colombia sas
- Victim Site: softwareappscol.com
- RipperSec targets the website of Tuv Haaretz
- Category: Defacement
- Content: The group claims to have defaced the website of Tuv Haaretz.Mirror Link: https://hack-db.org/mirror/6056
- Date: 2025-11-05T14:21:47Z
- Network: telegram
- Published URL: (https://t.me/c/2875163062/209) Screenshots: https://d34iuop8pidsy8.cloudfront.net/cfc296db-1638-4853-894a-50adabf08ce8.png
- Threat Actors: RipperSec
- Victim Country: Israel
- Victim Industry: E-commerce & Online Stores
- Victim Organization: tuv haaretz
- Victim Site: tuv-haaretz.co.il
- Alleged leak of 700k Hungarian user’s data
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 700,000 records of Hungarian user’s on a cybercrime forum. The dataset reportedly includes names, email addresses, phone numbers, addresses, IPs, passwords etc.NB : The data is said to have been aggregated from multiple breached sources and spans from 2011 up to 2025.
- Date: 2025-11-05T13:48:24Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-HUNGARY-700k-Email-Name-Phone-Address-IP-Password-Date) Screenshots: https://d34iuop8pidsy8.cloudfront.net/4b95e91e-c8a1-4f76-ba2d-63da29e10923.png
- Threat Actors: euseller
- Victim Country: Hungary
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Pine Pharmaceuticals falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained 18 GB of corporate data from Pine Pharmaceuticals, including detailed employee information such as I-9 forms, Social Security numbers, driver’s licenses, passports, birth and death certificates, financial records, internal confidentiality agreements, NDAs, and other sensitive corporate documents.
- Date: 2025-11-05T13:41:34Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c2c2a0e7-456c-4ff7-bce3-cb0226e65122.jpg
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: pine pharmaceuticals
- Victim Site: pinepharmaceuticals.com
- Christina falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained over 18GB of corporate data from Christina development, including personal information of employees such as passports, driver’s licenses, and birth or death certificates, as well as customer project details, client information, financial records, confidential files, NDAs, and other sensitive corporate documents.
- Date: 2025-11-05T13:40:26Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/6cebdba8-8ddb-471b-a509-1e71b43a8576.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: christina
- Victim Site: christinala.com
- Alleged data breach of Dalma Capital
- Category: Data Breach
- Content: The threat actor claims to have breached the data of Dalma Capital in UAE.
- Date: 2025-11-05T13:14:34Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/dalma-salma-capital-uae.45297/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/514bcb9d-c6c1-42f1-be23-10f5888fea80.JPG
- Threat Actors: show_more
- Victim Country: UAE
- Victim Industry: Investment Management, Hedge Fund & Private Equity
- Victim Organization: dalma capital
- Victim Site: dalmacapital.com
- Alleged leak of UAE citizens’ passport data
- Category: Data Breach
- Content: The group claims to have leaked UAE citizens’ passport data.
- Date: 2025-11-05T13:01:22Z
- Network: telegram
- Published URL: (https://t.me/SylhetGangSG1/7082) Screenshots: https://d34iuop8pidsy8.cloudfront.net/fd63171f-b004-4b65-be81-859d24192042.png
- Threat Actors: SYLHET GANG-SG
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Doxbin
- Category: Data Breach
- Content: The threat actor claims to have leaked over 76,000 records from Doxbin. The compromised dataset includes over 30,000 user accounts from the period 2008-2025.NB: The authenticity of the claim has yet to be verified. This organization was breached on January 12, 2025.
- Date: 2025-11-05T13:00:18Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Doxbin-net-10-11-2025-scrape-by-BengaminButton) Screenshots: https://d34iuop8pidsy8.cloudfront.net/7215b389-dff4-4d4c-ace4-b46968729508.png
- Threat Actors: Tanaka
- Victim Country: Unknown
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: doxbin
- Victim Site: doxbin.net
- Alleged data leak of Business Dubai
- Category: Data Breach
- Content: The threat actor claims to have access to companies registration data in Dubai, compromised from Business Dubai (Invest in dubai).
- Date: 2025-11-05T12:52:35Z
- Network: telegram
- Published URL: (https://t.me/c/2875163062/206) Screenshots: https://d34iuop8pidsy8.cloudfront.net/ddb710a3-35e1-4a79-9950-167ad4aca104.png
- Threat Actors: RipperSec
- Victim Country: UAE
- Victim Industry: Government Administration
- Victim Organization: business dubai
- Victim Site: investindubai.gov.ae
- Saigon Industrial Service J.S.C falls victim to DragonForce Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 66.52 GB of the organization’s data. The group intends to publish the data within 1 to 2 days.
- Date: 2025-11-05T12:51:48Z
- Network: tor
- Published URL: (http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog) Screenshots: https://d34iuop8pidsy8.cloudfront.net/3f8c6404-4260-4c93-be9a-d862b7938bd8.jpg
- Threat Actors: DragonForce
- Victim Country: Vietnam
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: saigon industrial service j.s.c
- Victim Site: saigonservice.vn
- BABAYO EROR SYSTEM targets the website of Shanghai Caerulum Pharma Discovery Co., Ltd
- Category: Defacement
- Content: The group claims to have defaced the website of Shanghai Caerulum Pharma Discovery Co., Ltd
- Date: 2025-11-05T12:50:40Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/566) Screenshots: https://d34iuop8pidsy8.cloudfront.net/24c7c99c-7744-42df-b7e2-27b41e172326.JPG
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: China
- Victim Industry: Research Industry
- Victim Organization: shanghai caerulum pharma discovery co., ltd
- Victim Site: caerulumpharm.com
- CoilPlus falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained 14GB of corporate data from Coilplus, including detailed employee information such as I-9 forms, Social Security numbers, driver’s licenses, passports, birth and death certificates, financial records, internal confidentiality agreements, NDAs, and other sensitive corporate documents.
- Date: 2025-11-05T12:43:19Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/bd2403a7-a8af-4747-870a-53c9fed329d8.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Mining/Metals
- Victim Organization: coilplus
- Victim Site: coilplus.com
- Maine Course Hospitality Group falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-05T12:14:17Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=b61cafd6-41fc-37f3-8fbd-ac386386302e) Screenshots: https://d34iuop8pidsy8.cloudfront.net/81bc6375-dc33-4490-ba5f-01222c2213f9.jpg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Hospitality & Tourism
- Victim Organization: maine course hospitality group
- Victim Site: mchg.com
- McIntosh Laboratory falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-11-05T11:57:35Z
- Network: tor
- Published URL: (http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/mcintoshlabscom/) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c9984747-7848-4cd0-b959-87c42ea59896.png
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: mcintosh laboratory, inc.
- Victim Site: mcintoshlabs.com
- Z-BL4CX-H4T targets the website of flightjab.com
- Category: Defacement
- Content: The group claims to have defaced the website of flightjab.com.
- Date: 2025-11-05T11:24:28Z
- Network: telegram
- Published URL: (https://t.me/c/3027611821/129) Screenshots: https://d34iuop8pidsy8.cloudfront.net/210fdf6f-1050-4fc9-80bb-3949176c8007.png https://d34iuop8pidsy8.cloudfront.net/970d3729-630f-4556-8eef-65b09cac5b26.png
- Threat Actors: Z-BL4CX-H4T
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: flightjab
- Victim Site: mcr.flightjab.com
- Z-BL4CX-H4T targets the website of Vigorous Software Inc.
- Category: Defacement
- Content: The group claims to have defaced the website of Vigorous Software Inc.
- Date: 2025-11-05T11:14:24Z
- Network: telegram
- Published URL: (https://t.me/c/3027611821/129) Screenshots: https://d34iuop8pidsy8.cloudfront.net/4302fad5-852e-421d-a3b6-9d71a667391c.png https://d34iuop8pidsy8.cloudfront.net/a073de1d-8c87-4090-99ff-adb9a980e533.png
- Threat Actors: Z-BL4CX-H4T
- Victim Country: Canada
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: vigorous software inc.
- Victim Site: app.vacaymatic.com
- Alleged data breach of ING Spain
- Category: Data Breach
- Content: The threat actor claims to be selling 21,090 rows of data from ING Spain, allegedly containing ID, date of birth, full name, city, surname, phone 1, phone 2, IBAN, bank code, and bank name.
- Date: 2025-11-05T10:17:32Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-ING-BANK-2025-21-090-IBAN-LEAD-%F0%9F%87%AA%F0%9F%87%B8) Screenshots: https://d34iuop8pidsy8.cloudfront.net/568f1eaa-abac-4a2c-9155-cd36fa9f6c43.png
- Threat Actors: BreachParty
- Victim Country: Spain
- Victim Industry: Financial Services
- Victim Organization: ing spain
- Victim Site: ing.es
- Alleged data sale of AppServ Limited Partnership
- Category: Data Breach
- Content: The threat actor claims to be selling 60.9 MB of data from AppServ Limited Partnership. The compromised dataset allegedly contains 215,707 names, 215,707 emails, and 215,707 MD5-hashed passwords.
- Date: 2025-11-05T09:23:23Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Thailand-215k-Name-Email-Password-Hash-MD5-appservhosting-com) Screenshots: https://d34iuop8pidsy8.cloudfront.net/56f90b4a-1870-4141-a325-e7d55286842f.png
- Threat Actors: AgSlowly
- Victim Country: Thailand
- Victim Industry: Computer & Network Security
- Victim Organization: appserv limited partnership
- Victim Site: appservhosting.com
- Alleged data leak of Hong Kong Telecommunications Limited
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Hong Kong Telecommunications Limited, allegedly including a 610-pack with ID card numbers.
- Date: 2025-11-05T08:54:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Hong-Kong-Telecom-610-pack-with-ID-Card-number) Screenshots: https://d34iuop8pidsy8.cloudfront.net/de3c4793-92ae-467f-9fae-b53a4908db66.png
- Threat Actors: yellowdianwei88
- Victim Country: China
- Victim Industry: Network & Telecommunications
- Victim Organization: hong kong telecommunications limited
- Victim Site: hkt.com
- Alleged leak of Saudi Arabian citizen’s passport data
- Category: Data Breach
- Content: The threat actor claims to have leaked Saudi Arabian citizen’s passport data.
- Date: 2025-11-05T08:49:24Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Saudi-passport) Screenshots: https://d34iuop8pidsy8.cloudfront.net/80fcd6a1-5a98-47d2-8bba-92ca659958cc.png
- Threat Actors: Arnoldsudney123
- Victim Country: Saudi Arabia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of a542.goodao.net
- Category: Defacement
- Content: The group claims to have defaced the website of a542.goodao.net
- Date: 2025-11-05T08:32:51Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/be97a73d-36d5-4e17-8e10-9fe2dfe56f45.jpeg
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: a542.goodao.net
- Victim Site: a542.goodao.net
- SERVER KILLERS claims to target UAE
- Category: Alert
- Content: A recent post by the group indicates that they will be attacking UAE
- Date: 2025-11-05T08:31:47Z
- Network: telegram
- Published URL: (https://t.me/xServerKillers/182) Screenshots: https://d34iuop8pidsy8.cloudfront.net/305e7f49-d739-41a4-9ff2-edcd8c7dd262.png
- Threat Actors: SERVER KILLERS
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of Healther
- Category: Defacement
- Content: The group claims to have defaced the website of Healther
- Date: 2025-11-05T08:29:12Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/8542a595-13b9-4465-9ad9-74f6a0141a77.jpeg
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: USA
- Victim Industry: Health & Fitness
- Victim Organization: healther
- Victim Site: helthyr.com
- BABAYO EROR SYSTEM targets the website of CoinLucid
- Category: Defacement
- Content: The group claims to have defaced the website of CoinLucid
- Date: 2025-11-05T08:26:53Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/2c73181c-1afd-4890-8920-5776aff121ec.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: UAE
- Victim Industry: Online Publishing
- Victim Organization: coinlucid
- Victim Site: invest.coinlucid.com
- BABAYO EROR SYSTEM targets the website of Karsaz Pvt. Ltd.
- Category: Defacement
- Content: The group claims to have defaced the website of Karsaz Pvt. Ltd.
- Date: 2025-11-05T08:23:58Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/17c66bfd-05aa-45f0-9f5b-ebe4c416c523.jpeg
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Pakistan
- Victim Industry: Machinery Manufacturing
- Victim Organization: karsaz pvt. ltd.
- Victim Site: karsaz.co
- BABAYO EROR SYSTEM targets the website of kexwallet.online
- Category: Defacement
- Content: The group claims to have defaced the website of kexwallet.online
- Date: 2025-11-05T08:16:55Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/51f2732d-4323-4f4e-baaa-63f7bba89b83.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: kexwallet
- Victim Site: kexwallet.online
- Alleged data leak of U.S. passport
- Category: Data Breach
- Content: The threat actor claims to have leaked U.S. passport data.
- Date: 2025-11-05T08:11:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-freshest-US-passport) Screenshots: https://d34iuop8pidsy8.cloudfront.net/e42c4572-ca8c-4576-8b06-9c8d8fb5df6c.png
- Threat Actors: Arnoldsudney123
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of Go Rute
- Category: Defacement
- Content: The group claims to have defaced the website of Go Rute.
- Date: 2025-11-05T08:07:19Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/36331587-3e7b-4dc6-aa7a-fbda3f45a332.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: go rute
- Victim Site: gorute.com
- BABAYO EROR SYSTEM targets the website of valmond.fr
- Category: Defacement
- Content: The group claims to have defaced the website of valmond.fr
- Date: 2025-11-05T08:01:00Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/37c4bad2-c479-4dac-9a49-0f535e0f268c.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: valmond
- Victim Site: valmond.fr
- BABAYO EROR SYSTEM targets the website of Qemy
- Category: Defacement
- Content: The group claims to have defaced the website of Qemy.
- Date: 2025-11-05T07:57:38Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsysteam3/565) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c1f64d6d-c255-4610-adfa-01296224a286.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Switzerland
- Victim Industry: Information Technology (IT) Services
- Victim Organization: qemy
- Victim Site: qemy.com
- Habib Bank AG Zurich falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 2560 GB of the organization’s data, totaling approximately 1991355 files.
- Date: 2025-11-05T07:13:22Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=3b3e7cad-63e3-340b-81e1-9aed5e5397d4) Screenshots: https://d34iuop8pidsy8.cloudfront.net/4aa92786-d93b-4ef8-93d6-4b685354543c.png https://d34iuop8pidsy8.cloudfront.net/606aa9d7-dd91-4cbb-a822-4803415d1e1d.png https://d34iuop8pidsy8.cloudfront.net/b9c3056e-f59c-49aa-b9b6-2a79a99c582b.png
- Threat Actors: Qilin
- Victim Country: Switzerland
- Victim Industry: Banking & Mortgage
- Victim Organization: habib bank ag zurich
- Victim Site: habibbank.com
- Alleged data breach of PT Data Utama Dinamika
- Category: Data Breach
- Content: The threat actor claims to have leaked data from PT Data Utama Dinamika, an internet service provider (ISP) and total IT solutions company in Indonesia.
- Date: 2025-11-05T07:04:24Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-DataUtamaNet-Data-Breach-Leaked-Download) Screenshots: https://d34iuop8pidsy8.cloudfront.net/b5e7d830-783a-4851-ab65-3bc775d2d6d7.png
- Threat Actors: KaruHunters
- Victim Country: Indonesia
- Victim Industry: Network & Telecommunications
- Victim Organization: pt data utama dinamika
- Victim Site: datautama.net.id
- S4uD1Pwnz targets the multiple websites of amirshasti.ir
- Category: Defacement
- Content: Group claims to have defaced multiple websites of amirshasti.irMirror id : https://www.zone-h.org/mirror/id/41488301 : https://www.zone-h.org/mirror/id/41488302 : https://www.zone-h.org/mirror/id/41488303
- Date: 2025-11-05T06:13:01Z
- Network: telegram
- Published URL: (https://t.me/Team_S4uD1Pwnz/61) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c893804c-3ee7-44c8-81f0-ffea235e6970.png https://d34iuop8pidsy8.cloudfront.net/60e168fb-65b4-4cdc-98a7-22ac2faa59c5.png https://d34iuop8pidsy8.cloudfront.net/3322f92e-c344-4459-b523-85f5b2de1fbc.png
- Threat Actors: S4uD1Pwnz
- Victim Country: Iran
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: amirshasti.ir
- S4uD1Pwnz targets the website of amirshasti.ir
- Category: Defacement
- Content: Group claims to have defaced the websites of amirshasti.irMirror id : https://www.zone-h.org/mirror/id/41488301 : https://www.zone-h.org/mirror/id/41488302 : https://www.zone-h.org/mirror/id/41488303
- Date: 2025-11-05T06:04:04Z
- Network: telegram
- Published URL: (https://t.me/Team_S4uD1Pwnz/61) Screenshots: https://d34iuop8pidsy8.cloudfront.net/c893804c-3ee7-44c8-81f0-ffea235e6970.png https://d34iuop8pidsy8.cloudfront.net/60e168fb-65b4-4cdc-98a7-22ac2faa59c5.png https://d34iuop8pidsy8.cloudfront.net/3322f92e-c344-4459-b523-85f5b2de1fbc.png
- Threat Actors: S4uD1Pwnz
- Victim Country: Iran
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: amirshasti.ir
- Alleged data breach of 1 2 3 Finance Group
- Category: Data Breach
- Content: A threat actor claims to have leaked sensitive data belonging to 1 2 3 Finance Group.
- Date: 2025-11-05T05:55:31Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-123Finance-PH-Application-Details-Leak) Screenshots: https://d34iuop8pidsy8.cloudfront.net/06f8e2b4-de7e-44cb-b091-6a1a5b94178c.jpeg
- Threat Actors: Ohminous
- Victim Country: Philippines
- Victim Industry: Financial Services
- Victim Organization: 1 2 3 finance group
- Victim Site: 123finance.ph
- Durvet, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-05T05:38:33Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=c974f730-da35-3ce5-ab43-555f053f123f) Screenshots: https://d34iuop8pidsy8.cloudfront.net/135d0389-a2b5-4ee7-bd36-6bb5e4126f1c.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Transportation & Logistics
- Victim Organization: durvet, inc
- Victim Site: durvet.com
- Enem Nostrum Remedies Pvt. Ltd falls victim to NightSpire Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.8TB of the organization’s internal data and intends to publish it within 19-20 days.
- Date: 2025-11-05T03:59:41Z
- Network: tor
- Published URL: (http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database) Screenshots: https://d34iuop8pidsy8.cloudfront.net/cdd1daa3-bc21-4aa6-babc-bf2935ed3071.png
- Threat Actors: NightSpire
- Victim Country: India
- Victim Industry: Research Industry
- Victim Organization: enem nostrum remedies pvt. ltd
- Victim Site: enemnostrum.com
- Alleged data breach of TechNexion Ltd
- Category: Data Breach
- Content: A threat actor claims to have leaked source code belonging to TechNexion Ltd
- Date: 2025-11-05T03:31:00Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-TechNexion-Ltd-Data-Breach-Leaked-Download) Screenshots: https://d34iuop8pidsy8.cloudfront.net/804b7c28-5649-43c5-94d7-e1495b0ce9e9.jpeg
- Threat Actors: KaruHunters
- Victim Country: Taiwan
- Victim Industry: Computer Hardware
- Victim Organization: technexion ltd
- Victim Site: technexion.com
- Alleged data breach of Internet Initiative Japan (IIJ)
- Category: Data Breach
- Content: The threat actor claims to have leaked source code from Internet Initiative Japan (IIJ), Japan’s first commercial ISP. The post states the breach occurred in November 2025
- Date: 2025-11-05T03:22:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-Internet-Initiative-Japan-Data-Breach-Leaked-Download) Screenshots: https://d34iuop8pidsy8.cloudfront.net/5594bc31-8cd3-4b90-92fa-27a1b1cc50e1.png https://d34iuop8pidsy8.cloudfront.net/7a25cfaf-4063-4738-b61b-600e3495cb4e.png
- Threat Actors: KaruHunters
- Victim Country: Japan
- Victim Industry: Information Technology (IT) Services
- Victim Organization: internet initiative japan (iij)
- Victim Site: iij.ad.jp
- Alleged data breach of AVM-BTP
- Category: Data Breach
- Content: A threat actor claims to have leaked employee credentials, customer data, and internal files from AVM-BTP.
- Date: 2025-11-05T03:10:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-AVM-BTP-Database-leaked-2025) Screenshots: https://d34iuop8pidsy8.cloudfront.net/331da89b-963e-4bdf-869f-a88291f3e390.jpeg
- Threat Actors: xNov
- Victim Country: France
- Victim Industry: Machinery Manufacturing
- Victim Organization: avm btp
- Victim Site: Unknown
- Alleged Unauthorized Access to Unidentified Indian Organisation
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an Indian company’s internal servers, exposing employee and client databases, production plans, financial reports, and confidential operational data. They allege that weak security measures such as plaintext password storage and inadequate monitoring enabled the breach, compromising sensitive information related to manufacturing, supply chains, and international operations.
- Date: 2025-11-05T01:06:56Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2290) Screenshots: https://d34iuop8pidsy8.cloudfront.net/1ff371d0-07ba-4410-a8e5-81533a6414e5.png https://d34iuop8pidsy8.cloudfront.net/f3e82917-7887-4394-8856-787df6d8d4dc.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Trescal
- Category: Data Breach
- Content: A threat actor claims to have leaked 70,k customer records and internal files from Trescal.
- Date: 2025-11-05T00:15:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Trescal-com-Data-Breach) Screenshots: https://d34iuop8pidsy8.cloudfront.net/8b96a490-5a4b-4351-8830-eea9901696f0.jpeg
- Threat Actors: Spirigatito
- Victim Country: France
- Victim Industry: Manufacturing
- Victim Organization: trescal international sas
- Victim Site: trescal.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including USA, China, France, Mexico, Canada, Spain, and others. The compromised data ranges from personal user information and credit card details to sensitive psychological evaluations, medical records, classified corporate documents, and large customer databases.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to VoIP PBX systems, e-commerce admin panels, and corporate networks. Ransomware remains a major threat, with groups like MEDUSA, Qilin, and akira actively listing victims across multiple industries and geographies. The prevalence of defacement attacks also points to a constant threat to organizational digital presence.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and ransomware attacks. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.