[October-21-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Ronemus & Vilensky Attorneys At Law falls victim to GENESIS Ransomware

  1. Tri City Foods, Inc. falls victim to Qilin Ransomware

  1. ClaimLinx falls victim to GENESIS Ransomware

  1. Dependable Plastics & Supplies falls victim to GENESIS Ransomware

  1. I-Tek Medical falls victim to GENESIS Ransomware

  1. Hider_Nex targets the website of PayPal Holdings, Inc

  1. Alleged sale of unauthorized email access to NEXTDOOR.COM

  1. Alleged sale of Taiwan cyber threat analysis document

  1. Sanhua International USA falls victim to Sinobi Ransomware

  1. Prime Dental Manufacturing, Inc. falls victim to Sinobi Ransomware

  1. Crave Culinaire falls victim to Sinobi Ransomware

  1. Alleged gain of access to ICS German Branch

  1. Alleged sale of Russian medical and military documents

  1. National Coatings falls victim to PLAY Ransomware

  1. Alleged data breach of Luks Artvin

  1. Nelligan White Architects falls victim to PLAY Ransomware

  1. Alleged data breach of japprendslabi.fr

  1. Alleged sale of admin access to an OpenCart store in USA

  1. Alleged sale of admin FTP access to an unidentified US sportswear e-commerce company

  1. Alleged sale of admin FTP access to US sportswear e-commerce company

  1. Alleged sale of admin FTP access to major US sportswear e-commerce company

  1. Alleged data breach of Figment POS

  1. Pacific West Systems Supply falls victim to akira ransomware

  1. Alleged sale of massive malware data dump

  1. Microdevice falls victim to BEAST Ransomware

  1. Alleged sale of unauthorized access to Fortinet systems (100 instances)

  1. Marquis Companies falls victim to LYNX Ransomware

  1. HRSD falls victim to CL0P Ransomware

  1. Mailing.com falls victim to akira Ransomware

  1. Alleged data sale of Vivid infotech Pvt. Ltd.

  1. Copeland LP falls victim to CL0P Ransomware

  1. Vertiv Group falls victim to CL0P Ransomware

  1. Napierski, VanDenburgh, Napierski & O’Connor, L.L.P. falls victim to akira Ransomware
  • Category: Ransomware
  • Content: The group claims to have obtained 6 GB of the organization’s data. The compromised information reportedly includes personal documents, full information of at least 150 of their clients such as full name, DOB, address, passport numbers, SSNs, DLs and so no. Employee personal information (DOB, addresses, phones, salaries and other information), a lot of court cases including ransomware and others.
  • Date: 2025-10-21T13:42:28Z
  • Network: tor
  • Published URL๐Ÿ™https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Legal Services
  • Victim Organization: napierski, vandenburgh, napierski & o’connor, l.l.p.
  • Victim Site: nvnolaw.com

  1. U.S. Vanadium LLC falls victim to CRYPTO24 Ransomware

  1. Alleged sale of N-Day exploit for Oracle

  1. Alleged unauthorized access to unidentified control system of a modular treatment plant in Poland

  1. Alleged data sale of Canadian Tire Corporation Limited

  1. Alleged unauthorized access to German Water Treatment Plant control system
  • Category: Initial Access
  • Content: The group claims to have gained access to the German water treatment plantโ€™s control system. They reportedly have the ability to monitor and manipulate key operational parameters, including pumps, valves, filters, and dosing systems. Real-time data on water levels, pressure, turbidity, pH, and chlorine content is accessible, along with historical logs and diagnostic data.
  • Date: 2025-10-21T12:32:04Z
  • Network: telegram
  • Published URL๐Ÿ™https://t.me/c/2549402132/409)
  • Screenshots:
  • Threat Actors: Inteid
  • Victim Country: Germany
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. DeKalb County falls victim to LYNX Ransomware

  1. Alleged unauthorized access to an unidentified control system of a grain storage in canada

  1. BRDSoft falls victim to Nova Ransomware

  1. Trail Ridge Energy Partners II LLC falls victim to LYNX Ransomware

  1. McDonald Building Co. falls victim to Sinobi Ransomware

  1. Alleged unauthorized access to SCG MyAccess

  1. Alleged leak of unauthorized admin access to Madrasa

  1. Chester County Library System falls victim to LYNX Ransomware

  1. Alleged unauthorized access to water injection control system in USA

  1. Alleged leak of huge compiled credential dataset

  1. Alleged sale of endpoint detection (EDR) accounts

  1. Alleged sale of decentralized botnet loader malware

  1. Alleged data leak of Georgian government IDs and passports

  1. Alleged data breach of AK.GE

  1. Infrastructure Destruction Squad to Have Found Security Vulnerability in Saudi Hajj and Umrah Company
  • Category: Vulnerability
  • Content: A group claims to have discovered a security vulnerability in the electronic system of a Hajj and Umrah company in the Kingdom of Saudi Arabia. The alleged flaw reportedly exposes sensitive data, including passports, personal photos, and vaccination certificates. The group stated that the discovery was made to protect the company and its customers, not to cause harm. They urged the organization to fix the issue and strengthen its cybersecurity measures.
  • Date: 2025-10-21T02:49:03Z
  • Network: telegram
  • Published URL๐Ÿ™https://t.me/n2LP_wVf79c2YzM0/2030)
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: Saudi Arabia
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged Leak of Oracle Corporation Server Data in Japan
  • Category: Data Breach
  • Content: The group claims to have gained access to an Oracle Corporation server located in Japan, allegedly extracting sensitive data including the X-UI panel database containing VPN/V2Ray configurations and user credentials, application and proxy configurations, network settings, log and memory files, as well as router firmware.
  • Date: 2025-10-21T01:50:58Z
  • Network: telegram
  • Published URL๐Ÿ™https://t.me/c/3076919011/142)
  • Screenshots:
  • Threat Actors: CLOBELSECTEAM
  • Victim Country: Japan
  • Victim Industry: Information Technology (IT) Services
  • Victim Organization: oracle corporation
  • Victim Site: oracle.com

  1. Alleged data leak of U.S. driverโ€™s licenses

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats.

Ransomware attacks are prevalent, with groups like GENESIS, Sinobi, LYNX, akira, CL0P, Qilin, BEAST, PLAY, CRYPTO24, and Nova claiming to have stolen significant volumes of data, including hundreds of gigabytes of confidential files, client personal/medical information, and financial data from numerous US-based organizations in industries like Law, Insurance, Manufacturing, Health Care, and Oil & Gas.

Initial Access sales are also frequently observed, with threat actors offering administrative FTP access and admin privileges to US e-commerce companies, as well as unauthorized access to industrial control systems (ICS) and SCADA systems in the US (Oil & Gas), Germany (Water Treatment), Poland (Modular Treatment Plant), and Canada (Grain Storage). Access to IT-related services like Fortinet systems and platforms like NEXTDOOR.COM is also being sold.

Data Breaches and Leaks encompass a wide variety of compromised information, including:

  • Over 41 million user records from Canadian Tire Corporation Limited.
  • Government identification documents and passports from Georgia.
  • Top secret cyber threat analysis documents from Taiwan and military/medical documents from Russia.
  • Source code from Figment POS (Jordan).
  • Databases with employee and customer data from French, Indian, and Turkish companies.
  • Massive malware data dumps with session cookies, payment card details, and passwords.
  • Data from an Oracle Corporation server in Japan.

Finally, the sale of Malware and Vulnerabilities such as a decentralized botnet loader and an N-Day exploit for Oracle (CVE-2025-61882) further demonstrates the active black market for offensive capabilities. The variety of victims and data types underscores the critical need for robust, multi-faceted cybersecurity defenses globally.