[October-14-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


1. ICET STUDIOS S.R.L. falls victim to The Gentlemen Ransomware


2. Alleged sale of TWINT Phishing Panel

  • Category: Phishing
  • Content: The threat actor claims to be selling a TWINT Phishing Panel a live admin panel for running phishing campaigns against TWINT and “71+ Swiss banks,” advertising credential-harvesting, anti-bot evasion, and partnership/traffic support.
  • Date: 2025-10-14T22:54:09Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/268231/)
  • Screenshots:
  • Threat Actors: Mastermind100
  • Victim Country: Switzerland
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

3. Alleged sale of unidentified hosting service providers data from Italy


4. Alu Perpignan falls victim to Qilin Ransomware



6. Alleged data sale of Democrazia Sovrana Popolare


7. Roger Renard Entreprise falls victim to Qilin ransomware


8. Hunter Construction Group falls victim to Qilin ransomware


9. Urban Linker falls victim to Qilin ransomware


10. Executive Cabinetry falls victim to Qilin Ransomware


11. Alquería falls victim to Qilin ransomware


12. SICE falls victim to Qilin ransomware


13. Alleged Sale of Customer Export from EKK Anlagentechnik GmbH & Co. KG


14. Alleged data sale of Ola Chat


15. New Jersey Property-Liability Insurance Guaranty Association falls victim to Qilin ransomware


16. SFG Technology falls victim to Qilin ransomware


17. Saint Charles International falls victim to Qilin Ransomware


18. WebCut Converting falls victim to Qilin ransomware


19. Volkswagen France falls victim to Qilin ransomware


20. Pro Fab falls victim to Qilin ransomware


21. Alleged sale of access to Ministry of Finance, Thailand


22. L.LOFT falls victim to Qilin Ransomware


23. Typology falls victim to Qilin Ransomware


24. ditransa falls victim to Qilin Ransomware


25. LaRosa’s Pizzeria, Inc. falls victim to Qilin Ransomware


26. TRANS-WORLD SHIPPING SERVICE, INC. falls victim to Qilin Ransomware


27. Addis falls victim to Qilin Ransomware


28. Gittens Healthcare falls victim to Qilin Ransomware


29. Alleged leak of admin credentials from hustle.ne.jp


30. City of Riviera Beach falls victim to Qilin Ransomware


31. Alleged sale of Russia Gambling – Casino leads


32. Buldi falls victim to Qilin Ransomware


33. Paris Retina Vision falls victim to Qilin Ransomware


34. Alleged sale of unauthorized access to an unidentified wordpress shop from Asia


35. Perinatal Quality Collaborative of North Carolina (PQCNC) falls victim to Qilin Ransomware


36. HMP Global falls victim to Qilin Ransomware


37. INDOHAXSEC targets the website of Trans7


38. Helene Gascon falls victim to Qilin ransomware


39. Polar-Studio Ltd falls victim to Qilin ransomware


40. Morris – Sockle falls victim to Qilin Ransomware


41. Alleged data breach of TRANS7


42. Capitol Construction Services falls victim to Qilin ransomware


43. Catawba County Government falls victim to Qilin Ransomware


44. Alleged Sale of Australian Data Lookup API


45. Alleged Sale of Canadian Data Lookup API


46. Art Guild, Inc. falls victim to akira Ransomware

  • Category: Ransomware
  • Content: The group claims to have obtained 24 GB of the organization’s data. The compromised data includes HR files with employee information (DOB, addresses, phones, medical test and so on), a bit of client data, financials, contracts, confidential project files, NDAs, etc.
  • Date: 2025-10-14T16:55:44Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Events Services
  • Victim Organization: art guild, inc.
  • Victim Site: artguildinc.com

47. Alleged Sale of U.S. Data Validation and Enrichment API


48. Ostrolenk Faber LLP falls victim to akira Ransomware


49. Repeated Signal Solutions, Inc. falls victim to Qilin Ransomware


50. Club Lleuresport falls victim to Qilin Ransomware


51. Tong Yang Industry Co Ltd falls victim to Qilin Ransomware


52. Radiant Beauty Supplies falls victim to Qilin Ransomware


53. The Law Office of Michael C. George P.A. falls victim to DragonForce Ransomware


54. Autorotor Srl falls victim to DragonForce Ransomware


55. DV Hardwoods falls victim to Qilin Ransomware



57. Blood Bank Computer Systems falls victim to akira Ransomware

  • Category: Ransomware
  • Content: The group claims to have obtained 20 GB of the organization’s data. The compromised data includes employee’s personal document scans such as passports, driver’s licenses, Social Security numbers, W-9 forms, and credit card details, as well as confidential HR forms, client information, medical records, financial and accounting data, contracts and agreements, and NDAs.
  • Date: 2025-10-14T13:23:59Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Software
  • Victim Organization: blood bank computer systems
  • Victim Site: bbcsinc.com

58. Alleged data sale of Medicine Mahasarakham University


59. PRATT HOMES & REMODELING falls victim to Qilin Ransomware


60. DuVal & Associates, PA falls victim to Qilin Ransomware


61. Greenstar Social Marketing Pakistan (Guarantee) Limited falls victim to Qilin Ransomware


62. Force Marketing falls victim to Qilin Ransomware


63. Plast-O-Matic Valves falls victim to akira Ransomware


64. M & E Global Group falls victim to Qilin Ransomware


65. NTB CYBER TEAM targets the website of SOLARGRAM


66. NTB CYBER TEAM targets the website of Youth Education


67. Alleged leak of admin access to Office of the Basic Education Commission


68. Alleged leak of admin access to Department of Highways


69. Alleged sale of admin access to the Khyber Pakhtunkhwa Health Care Commission in Pakistan


70. Alleged data breach of the Ministry of Welfare and Social Affairs, Israel


71. Alleged data breach of Nimpha

  • Category: Data Breach
  • Content: The group claims to have leaked 20K records of Nimpha in Ukraine. . The compromised data reportedly contain personal customer data (names, contact information), email addresses, phone numbers, password, order and bonus account data and internal identifiers and service information.
  • Date: 2025-10-14T08:19:36Z
  • Network: telegram
  • Published URL: (https://t.me/itarmyofrussianews/263)
  • Screenshots:
  • Threat Actors: IT ARMY OF RUSSIA
  • Victim Country: Ukraine
  • Victim Industry: E-commerce & Online Stores
  • Victim Organization: nimpha
  • Victim Site: nimpha.ua

72. Alleged data leak of Empat Lawang Regency


73. Alleged data leak of Kyiv tax service passport records

  • Category: Data Breach
  • Content: The group claims to be selling a dataset allegedly exfiltrated from the Kyiv Tax Service. The data reportedly includes over 90,000 passport copies, along with individuals’ addresses, phone numbers, and professional details, totaling approximately 24.5 GB of information.
  • Date: 2025-10-14T06:55:57Z
  • Network: telegram
  • Published URL: (https://t.me/molotTeam/55)
  • Screenshots:
  • Threat Actors: M.O.L.O.T.
  • Victim Country: Ukraine
  • Victim Industry: Government Administration
  • Victim Organization: Unknown
  • Victim Site: Unknown

74. Alleged data leak of Niche Health emails


75. Speed Inter Transport Co., Ltd. falls victim to Dire Wolf Ransomware


76. Miguel Veiga, Neiva Santos e Associados falls victim to Dire Wolf Ransomware


77. Alleged Data Leak of Argentine CUIT/CUIL Emails


78. Alleged sale of Fudbio


79. Alleged data breach of Schedler Transport-Logistik GmbH


80. Alleged sale of ALBIRIOX


81. Karnes Electric Cooperative, Inc. falls victim to Qilin Ransomware


82. Business Integra Technology Solutions, Inc. falls victim to akira Ransomware


Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Ransomware remains the most frequent category, often perpetrated by the Qilin group, affecting a wide range of industries globally, with a concentration in the USA and France. The Building and construction, Legal Services, and Manufacturing sectors are notably impacted by ransomware campaigns.

Data Breaches are also prominent, involving the sale of sensitive personal and corporate data, often through openweb forums, and impacting countries like Italy, Russia, and Indonesia. Several incidents involved the sale of bulk data, including records from Russian legal entities (6.4 million records), an Australian Data Lookup API, and a large dataset of customer and internal data from Ola Chat (over 100 million users).

The sale of Initial Access continues to be a key element of the cyber underground, targeting government organizations in Thailand and Pakistan, as well as Japanese and generic Asian WordPress shops. Furthermore, the market for Malware tools is active, with offers for a TWINT Phishing Panel, a crypting service (Fudbio), and an Android spyware/RAT (ALBIRIOX).

The geographical spread and varied tactics of these incidents emphasize the critical need for robust cybersecurity defenses, particularly in managing access controls, protecting customer data, and defending against pervasive ransomware operations.