[October-2-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


1. Shamir Medical Center falls victim to Qilin Ransomware


2. Alleged sale of ChileAtiende


3. Alleged Sale of Admin Dashboard Access


4. Alleged Sale of Redirect/ Admin Dashboard Access


5. Alleged sale of Cyprus Post data

  • Category: Data Breach
  • Content: The threat actor claims to be selling data allegedly stolen from Cyprus Post, including mails, invoices, and sensitive documents from government entities, police departments, embassies, and ministries. The data reportedly involves communications from various embassies and ministries of the Republic of Cyprus.
  • Date: 2025-10-02T14:20:44Z
  • Network: openweb
  • Published URL: (https://darkforums.st/Thread-Selling-Cyprus-Post-Database)
  • Screenshots:
  • Threat Actors: ByteToBreach
  • Victim Country: Cyprus
  • Victim Industry: Transportation & Logistics
  • Victim Organization: cyprus post
  • Victim Site: cypruspost.post

6. Alleged Data Breach of Red Hat


7. INDOHAXSEC targets multiple Indian websites


8. BABAYO EROR SYSTEM targets the website of Joyou Inc.


9. Alleged data leak of Banjarbaru City Government, Indonesia


10. Alleged sale of unauthorized admin access to a Silicon Valley-based supply chain platform


11. Alleged data leak of unidentified organisation in Japan

  • Category: Data Breach
  • Content: The threat actor claims to have leaked several documents containing the Accelerator Driven System for nuclear waste transmutation, international projects details,working schemes of fusion reactors and Japanese research facilities details from unidentified organisation in Japan.
  • Date: 2025-10-02T13:22:32Z
  • Network: telegram
  • Published URL: (https://t.me/c/2911263260/247)
  • Screenshots:
  • Threat Actors: CLOBELSECTEAM
  • Victim Country: Japan
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

12. Dual Temp Company falls victim to akira ransomware


13. Alleged data leak of Zeelab Pharmacy


14. Alleged Sale of Admin Access for a French E-commerce Site


15. DisplayIt falls victim to Akira Ransomware


16. Apricorn falls victim to akira ransomware


17. Cyb3r Drag0nz claims to target Iraq


18. FANATIX LEGION targets multiple German websites


19. Gesimde, Ausil Systems and Esnova Racks falls victim to Space Bears Ransomware


20. Alleged leak of Santander, BBVA, and Sabadell bank data


21. Gesimde falls victim to Space Bears Ransomware


22. Alleged data breach of DepEd – Cordillera Administrative Region


23. Alleged data leak of Ukrainian citizens, companies, and army database


24. Alleged data leak of Moroccan citizens database


25. Alleged data breach of OrderZ


26. Alleged data leak of Corolis


27. Alleged data leak of BMW AG


28. Alleged data leak of Mercedes-Benz AG


29. Alleged data breach of Inditex


30. Alleged data leak of OpenAI


31. Alleged data breach of deSEC e.V.


32. Alleged sale of B2B USA finance professional leads data


33. Alleged data leak of Malaysian Navy


34. Alleged leak of Cephas Installer 1.0


35. Sarcoma ransomware group has added an unidentified victim


36. Alleged leak of admin credentials of SD ISLAM TAHFIDZ QUR’AN AL FA-JR

  • Category: Initial Access
  • Content: The threat actor claims to have compromised the login panel of SD ISLAM TAHFIDZ QUR’AN AL FA-JR, leaking administrator login credentials including the admin username and password
  • Date: 2025-10-02T06:00:22Z
  • Network: telegram
  • Published URL: (https://t.me/c/2622575053/97)
  • Screenshots:
  • Threat Actors: NOTRASEC TEAM
  • Victim Country: Indonesia
  • Victim Industry: Education
  • Victim Organization: sd islam tahfidz qur’an al fa-jr
  • Victim Site: sditalfajr.com

37. Alleged sale of unauthorized access to Cisco ThousandEyes


38. Alleged sale of WinRAR RCE exploit CVE-2025-8088


39. Drain-All Ltd. falls victim to Sinobi Ransomware


40. Alleged sale of WP admin access to an unidentified organization in USA


41. Jaraflex Energiesysteme falls victim to Sinobi Ransomware


42. Integrity Wealth Consulting falls victim to Sinobi Ransomware


43. Marsee Baking falls victim to Sinobi Ransomware


44. LASER AUTOMOTIVE VALENCIA SL falls victim to Sinobi Ransomware


45. Spectrum Painting NYC falls victim to Sinobi Ransomware


46. Prince William Ice Center falls victim to Sinobi Ransomware


47. John Muir Charter Schools falls victim to Sinobi Ransomware


48. Lugand Aciers falls victim to Sinobi Ransomware


49. Muller Inc. falls victim to Sinobi Ransomware


50. AT Solution falls victim to Sinobi Ransomware


51. Judson Center falls victim to Sinobi Ransomware


52. Immaculate Heart of Mary falls victim to Sinobi Ransomware


53. American Association on Health and Disability (AAHD) falls victim to Sinobi Ransomware


54. Johnson Regional Medical Center falls victim to Sinobi Ransomware


55. Alleged data sale of Progressive Leasing


56. Karat® by Lollicup™ falls victim to Sinobi Ransomware


57. Alleged data leak of Indonesian people’s data


58. Alleged leak of gmail accounts from Argentina


59. Alleged data leak of government logins


Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and ransomware attacks are prominent, affecting various sectors from Healthcare and Financial Services to Government Administration and E-commerce, and impacting countries including the USA, Spain, France, India, and Indonesia.

The compromised data is extensive, ranging from patient records and financial information (including SSNs and banking details) to customer records, source code, and classified military documents.

Beyond data compromise, the report also reveals significant activity in Initial Access sales, with threat actors offering unauthorized access to a Silicon Valley supply chain platform, Cisco ThousandEyes, and various e-commerce sites. The sale of malware, including a backdoored Debian installer, and information on a critical WinRAR vulnerability further underscores the availability of offensive capabilities in the cyber underground.

The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.