[October-15-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


1. Alleged sale of a Golang-based information stealer


2. Rasi Laboratories falls victim to Qilin Ransomware


3. Richmond Behavioral Health falls victim to Qilin Ransomware


4. Alleged sale of India Employers Database


5. State Tax Administration Agency falls victim to Qilin Ransomware


6. Alleged sale of classified U.S. Space Force documents


7. Alleged sale of Global Business Companies email database


8. Alleged unauthorized admin access to Kuwait Real Estate Brokers Union


9. Pharaoh’s Team targets the website of SkyBridge Logistics


10. Pharaoh’s Team targets the website duanduancapital.org


11. Pharaoh’s Team targets the website beconwealthcapital.org


12. Pharaoh’s Team targets the website of stargatexpress.co.uk


13. Alleged Sale of UAE Employers Database


14. REGIONAL UROLOGY, LLC falls victim to DEVMAN 2.0 Ransomware


15. Alleged data sale of Bicing


16. Alleged gain of access to Fertirrigatore 32 EV station, Italy


17. Alleged gain of admin access to Ministry of Natural Resources and Environment


18. Royal Thai falls victim to PLAY Ransomware


19. Koch & White Heating & Cooling falls victim to PLAY Ransomware


20. Legacy Manufacturing falls victim to PLAY Ransomware


21. Global Shop Solutions falls victim to PLAY Ransomware


22. Cellucap Manufacturing falls victim to PLAY Ransomware


23. Alleged sale of data from Chipman


24. East Jefferson General Hospital falls victim to Sinobi Ransomware


25. Alleged sale of personal data of job seekers in the UAE


26. Alleged sale of a dataset containing information on active real estate agencies in the UAE


27. Zierick Manufacturing falls victim to Sinobi Ransomware


28. Alleged sale of a dataset containing information on active commercial companies


29. Alleged sale of French database


30. Core Resources Inc (CRI) falls victim to Sinobi Ransomware


31. Alleged sale of personal data of Iranian nationals residing in the UAE


32. Alleged sale of personal data of UAE police personnel


33. Newmark Healthcare Services falls victim to Sinobi Ransomware


34. FOUNDER-525 targets the website fulsheareb5.com


35. FOUNDER-525 targets the website gm.ontherightway.com


36. Alleged data leak of Lumisa Energías


37. FOUNDER-525 targets the website movazzedent.com


38. FOUNDER-525 targets the website of tour.gorib.space


39. Alleged sale of compromised PrestaShop admin access & credit‑card redirect


40. FOUNDER-525 targets the website sundarbansangbad.com


41. FOUNDER-525 targets the website autolunasmungia.com


42. Alleged sale of Italy hoitos


43. Alleged data breach of Lorestan Petrochemical Company


44. Alleged sale of unauthorized TRX withdrawal tool

  • Category: Malware
  • Content: The threat actor claims to be selling a self‑written “Tron/TRX drainer” that can withdraw funds from other people’s Tron (TRX) wallets without authorization. The listing explicitly markets the tool for use in offices and call centres, advertises ready‑made funnels for targeting victims, and invites private messages for detailed terms. This appears to be malicious software intended to enable theft, fraud, and money laundering.
  • Date: 2025-10-15T15:03:52Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/268265/)
  • Screenshots:
  • Threat Actors: cappucino
  • Victim Country: Unknown
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

45. Alleged sale of German IBAN, crypto, and casino leads


46. NXBB.SEC targets the website of Nakhon Ratchasima Rajabhat University


47. Centurion Family Office Services falls victim to Qilin Ransomware


48. Buanderie Blanchelle falls victim to Qilin Ransomware


49. Alleged data breach of ChampionX


50. Victory Church falls victim to Qilin Ransomware


51. Leyhausen Research GmbH falls victim to Qilin Ransomware


52. Bay West LLC, falls victim to Qilin Ransomware


53. Ville Elne falls victim to Qilin Ransomware


54. Wheale Law Firm falls victim to Qilin Ransomware


55. Le Toit Forézien falls victim to Qilin Ransomware


56. The Kennedy Group, an Inovar company falls victim to Qilin Ransomware


57. Kearney Public Schools falls victim to INTERLOCK Ransomware


58. Superior Linen Supply Company falls victim to Qilin Ransomware


59. Turnkey Africa falls victim to Qilin Ransomware


60. Community Based Support falls victim to LYNX Ransomware


61. Alleged sale of Windows LPE 0-Day Exploit


62. Alleged sale of US database

  • Category: Data Breach
  • Content: A threat actor claims to be selling a U.S. database. The compromised data reportedly includes full name, address, phone number, email, gender, date of birth, Social Security number (SSN), driver’s license, employment information, and Employer Identification Number (EIN)
  • Date: 2025-10-15T11:23:55Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/268251/)
  • Screenshots:
  • Threat Actors: Shadowland
  • Victim Country: USA
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

63. Alleged leak of vietnam student data


64. BABAYO EROR SYSTEM targets the website of International Tamil Arts And Cultural Council (ITAACC)


65. Alleged leak of Chinese citizens data


66. Alleged unauthorized access to an unidentified organization in Singapore


67. Alleged unauthorized access to an unidentified organization in Canada


68. Alleged data sale of Packingsupply.in


69. Global Go falls victim to Kill Security Ransomware


70. NXBB.SEC targets multiple websites


71. Navigator Business Solutions falls victim to PEAR Ransomware



73. Night Owll targets the website of WPEngine


74. NXBB.SEC targets the website of Slot Demo PG Soft


75. Unimed do Brasil falls victim to Sarcoma Ransomware


76. Alleged Data breach of Bank of America


77. Alleged data breach of Teknobuilt


78. Alleged sale of unauthorized access to an unidentified wordpress shop


79. Alleged data breach of Chipman


80. Alleged data breach of Selby Furniture Hardware


81. Alleged data breach of Fiscalía General del Estado – Bolivia


82. Alleged leak of Academic Jihad Qazvin Province Iran DataBase


83. Alleged leak of WhatsApp users mobile numbers from Iran


84. Alleged data breach of Ministry of Cooperatives, Labour, and Social Welfare of Iran

  • Category: Data Breach
  • Content: The threat actor claims to be selling a database from mcls.gov.ir (Iran Ministry of Cooperatives, Labour, and Social Welfare) an alleged dataset containing Iranian citizens’ personal records including mail account information, birth dates, education status, and additional sensitive PII.
  • Date: 2025-10-15T02:43:16Z
  • Network: openweb
  • Published URL: (https://leakbase.la/threads/iran-goverment-site-database-leaked.44487/)
  • Screenshots:
  • Threat Actors: Rat_leak
  • Victim Country: Iran
  • Victim Industry: Government Administration
  • Victim Organization: ministry of cooperatives, labour, and social welfare of iran
  • Victim Site: mcls.gov.ir

85. Alleged data leak of Yazd University


86. Alleged leak of Iranian Student Data


87. Alleged data leak of 95 Million iranian citizens


88. Alleged Leak of Star Management System and Client Accounts

  • Category: Initial Access
  • Content: The group claimes to have gained access to client account management systems and the Star Management platform, holding a total of 1,127 stars. The group stated they donated 50 stars to the Children’s Helpline and plan further donations to hospitals and children in need. They claim these actions aim to support medical and humanitarian aid initiatives for children.
  • Date: 2025-10-15T01:31:35Z
  • Network: telegram
  • Published URL: (https://t.me/n2LP_wVf79c2YzM0/1941)
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: Unknown
  • Victim Industry: Unknown
  • Victim Organization: star management system and client accounts
  • Victim Site: Unknown

89. All Truck Transportation Co, Inc. falls victim to Qilin Ransomware


90. Charles River Properties LLC falls victim to Qilin Ransomware

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Ransomware activity, particularly from the Qilin and PLAY groups, is prominent, impacting sectors like Healthcare & Pharmaceuticals, Hospital & Health Care, Manufacturing, and Financial Services across the USA, Canada, France, Germany, and Kenya. These attacks involve the theft of significant volumes of internal and confidential data, with one incident citing a massive 9.9 TB breach of client information.

Data Breach/Leak incidents remain widespread, affecting organizations and individuals globally, including in the UAE (targeting real estate agencies, police personnel, and Iranian nationals), Iran (compromising academic, government, and citizen data), Spain (utility and transport data), India (e-commerce), and the USA (classified government documents and financial services). The compromised data is highly sensitive, ranging from full personal information, credit card details, and IBANs to highly classified military and government documents.

Furthermore, the report reveals continued activity in the Initial Access market, with threat actors selling access to government systems (Thailand), industrial control systems (Italy), real estate organizations (Kuwait), and e-commerce platforms (Spain). The presence of Malware offerings, including a Golang-based information stealer and a Windows LPE 0-Day Exploit, underscores the proliferation of advanced offensive capabilities available in the cyber underground.

Finally, Defacement activity, with groups like Pharaoh’s Team and NXBB.SEC, targets various websites globally, including logistics firms, universities, and gaming sites.

Collectively, these incidents demonstrate that organizations across diverse industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the continued trade of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.