This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
1. WOLF CYBER ARMY targets the website of Cariumulya Village Government Website
- Category: Defacement
- Content: The group claims to have deface the website of Cariumulya Village Government Mirror id : https://defacer.id/mirror/id/202769
- Date: 2025-10-22T23:19:22Z
- Network: telegram
- Published URL: (https://t.me/c/2670088117/392)
- Screenshots:
- Threat Actors: WOLF CYBER ARMY
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: cariumulya village government
- Victim Site: desacariumulya.com
2. HellR00ters Team targets the website of Joinchat
- Category: Defacement
- Content: The group claims to have deface the website of Joinchat.
- Date: 2025-10-22T23:06:08Z
- Network: telegram
- Published URL: (https://t.me/c/2758066065/100)
- Screenshots:
- Threat Actors: HellR00ters Team
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
3. Alleged Unauthorized Access to CARE Management System
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the internal management system of CARE in Saudi Arabia exposing data related to branches, clients, and daily operations. The alleged system includes maps of facilities near the Kuwait border and performance statistics of each branch. The group stated their act was politically motivated, expressing strong support for Palestine
- Date: 2025-10-22T23:02:27Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2047)
- Screenshots:
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Saudi Arabia
- Victim Industry: Hospital & Health Care
- Victim Organization: national medical care company
- Victim Site: care.med.sa
4. Abdullatif Alissa Group Holding Co. falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s internal data.
- Date: 2025-10-22T22:53:36Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=482f254f72bb02d641fa8c65a1190df1)
- Screenshots:
- Threat Actors: MEDUSA
- Victim Country: Saudi Arabia
- Victim Industry: Investment Management, Hedge Fund & Private Equity
- Victim Organization: abdullatif alissa group holding co.
- Victim Site: alissa-group.com
5. ATIRG falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-22T22:29:43Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=94b263b82b7111168b1e46266efef67f)
- Screenshots:
- Threat Actors: MEDUSA
- Victim Country: France
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: association pour le traitement de l’insuffisance rénale en guyane
- Victim Site: atirg.fr
6. Adore Children & Family Services falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and they intend to publish it within 15-16 days.
- Date: 2025-10-22T22:11:08Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=9e14d88b0261ed97cde237330ccb55e7)
- Screenshots:
- Threat Actors: MEDUSA
- Victim Country: USA
- Victim Industry: Civic & Social Organization
- Victim Organization: adore children & family services
- Victim Site: adore-children.com
7. Cooperativa Esercenti Farmacia scrl falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and they intend to publish it within 9-10 days.
- Date: 2025-10-22T22:06:12Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=977496d1da6f9933ffea66746cc55294)
- Screenshots:
- Threat Actors: MEDUSA
- Victim Country: Italy
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: cooperativa esercenti farmacia scrl
- Victim Site: cef-farma.it
8. Alleged sale of unauthorized access to Forti networks
- Category: Initial Access
- Content: Threat actor claims to be selling around 100 Fortinet-related accesses.
- Date: 2025-10-22T21:51:34Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/268748/)
- Screenshots:
- Threat Actors: give_s
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
9. Alleged sale of Palestinian government email log
- Category: Data Breach
- Content: Threat actor claims to be selling leaked Palestinian government email log from year 2025.
- Date: 2025-10-22T21:46:20Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-WORKING-PALESTINIAN-GOV-EMAIL-LOG-IN-2025)
- Screenshots:
- Threat Actors: jrintel
- Victim Country: Palestine
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
10. Grupo Promasa falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-22T21:39:42Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=4e3651f1-3e84-3e70-8508-f1e4622e2ac9)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: Honduras
- Victim Industry: Building and construction
- Victim Organization: grupo promasa
- Victim Site: promasa.hn
11. Signet Armorlite, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-22T21:26:44Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=b7ba324e-8bb8-3811-b5d9-64fa988227dc)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Medical Equipment Manufacturing
- Victim Organization: signet armorlite, inc.
- Victim Site: signetarmorlite.com
12. Integral Networks, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-22T21:17:26Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=f69b29b6-bbd3-38bc-98bf-80eeee2416ba)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: integral networks, inc.
- Victim Site: integralnetworks.com
13. NurseSpring falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-22T21:11:29Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=e23f4a42-d27c-3df4-ae9f-4fe8e183ed4c)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: nursespring
- Victim Site: nursespring.com
14. CHDFS, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1000 GB of organization data.
- Date: 2025-10-22T21:05:06Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=6e4fc989-4548-39f2-8b7e-426500b14c84)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: chdfs, inc.
- Victim Site: chdfs.org
15. Samera Health falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 194 GB of organization data.
- Date: 2025-10-22T20:58:44Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=f9c51682-1c8a-33ec-80d3-7c94a6d0186b)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Insurance
- Victim Organization: samera health
- Victim Site: samerahealth.com
16. Real Estate Specialists falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained data from the organization.
- Date: 2025-10-22T20:43:32Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=bee3a0f0-d933-338f-8e34-2384dd6297ed)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: real estate specialists
- Victim Site: realestatespl.com
17. Alleged data sale of Universidad Autónoma Tomás Frías
- Category: Data Breach
- Content: Threat actor claims to be selling leaked students data from Universidad Autónoma Tomás Frías, Bolivia. The compromised data reportedly contains students and applicants from 2004 to 2025 including ID card number, full name, degree program, student ID number, etc. NB: Universidad Autónoma Tomás Frías was previously fall victim to STORMOUS Ransomware on Sat Nov 16 2024.
- Date: 2025-10-22T20:26:52Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-UATF-BOLIVIAN-UNIVERSITY-STUDENTS-2004-2025)
- Screenshots:
- Threat Actors: vulnerandolo
- Victim Country: Bolivia
- Victim Industry: Education
- Victim Organization: universidad autónoma tomás frías
- Victim Site: uatf.edu.bo
18. KHL Printing falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained data from the organization.
- Date: 2025-10-22T19:38:04Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=408c74a0-a583-3c29-8c75-05011e921d36)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: Singapore
- Victim Industry: Printing
- Victim Organization: khl printing
- Victim Site: khlprint.com.sg
19. Alleged data breach of Rozetka
- Category: Data Breach
- Content: The group claims to have leaked data of more than 30,000 Rozetka customers, including full names, emails, home and work addresses, and phone numbers.
- Date: 2025-10-22T18:41:01Z
- Network: telegram
- Published URL: (https://t.me/usersecc/544)
- Screenshots:
- Threat Actors: UserSec
- Victim Country: Ukraine
- Victim Industry: E-commerce & Online Stores
- Victim Organization: rozetka
- Victim Site: rozetka.ua
20. United Lube Oil falls victim to RansomHouse Ransomware
- Category: Ransomware
- Content: The group claims to have obtained data from the organization.
- Date: 2025-10-22T18:14:31Z
- Network: tor
- Published URL: (http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/r/ff185211dfc591fbc49746813fdfeec209c94bd9)
- Screenshots:
- Threat Actors: RansomHouse
- Victim Country: Saudi Arabia
- Victim Industry: Oil & Gas
- Victim Organization: united lube oil
- Victim Site: u-lube.com
21. Alleged data sale of Ministry of Health and Sports (Bolivia)
- Category: Data Breach
- Content: Threat actor claims to be selling leaked central citizen registry data from Ministry of Health and Sports ,Bolivia. The compromised data reportedly contains 10,335,788 lines of data including ID, name, phone, DOB, address, etc.
- Date: 2025-10-22T17:44:10Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-MASSIVE-OFFER-Digital-Census-ID-BOL-10M-Full-Doxing-Kit)
- Screenshots:
- Threat Actors: vulnerandolo
- Victim Country: Bolivia
- Victim Industry: Government Administration
- Victim Organization: ministry of health and sports
- Victim Site: minsalud.gob.bo
22. Alleged sale of unauthorized access to an unidentified organization in UK
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized Forti VPN access to an unidentified manufacturing company in UK.
- Date: 2025-10-22T17:24:49Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/268730/)
- Screenshots:
- Threat Actors: Mark1777
- Victim Country: UK
- Victim Industry: Manufacturing
- Victim Organization: Unknown
- Victim Site: Unknown
23. More Than Gourmet falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 126 GB of the organization’s data.
- Date: 2025-10-22T16:41:01Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ade81842-faf6-3a8e-b6ef-fe283e4410f2)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Food Production
- Victim Organization: more than gourmet
- Victim Site: morethangourmet.com
24. Superior Air Parts falls victim to SECUROTROP Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 383 GB of organization’s data.
- Date: 2025-10-22T16:27:04Z
- Network: tor
- Published URL: (http://securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid.onion/)
- Screenshots:
- Threat Actors: SECUROTROP
- Victim Country: USA
- Victim Industry: Aviation & Aerospace
- Victim Organization: superior air parts
- Victim Site: superiorairparts.com
25. Magna Hospitality Group, L.C. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 385 GB of the organization’s data. Sample screenshots are available on their dark web portal.
- Date: 2025-10-22T15:25:14Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=f2926554-50b4-3595-8f85-d42ad9e35ffd)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Hospitality & Tourism
- Victim Organization: magna hospitality group, l.c.
- Victim Site: magnahospitality.com
26. AT&T falls victim to Everest Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization data and intend to publish it within 6-7 days.
- Date: 2025-10-22T14:20:23Z
- Network: tor
- Published URL: (http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/news/att/)
- Screenshots:
- Threat Actors: Everest
- Victim Country: USA
- Victim Industry: Network & Telecommunications
- Victim Organization: at&t
- Victim Site: att.com
27. Alleged data leak of Fuchu City Hall
- Category: Data Breach
- Content: The group claims to have leaked data from Fuchu City Hall.
- Date: 2025-10-22T14:05:01Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: fuchu city hall
- Victim Site: city.fuchu.tokyo.jp
28. Alleged data leak of Shizuoka Prefecture
- Category: Data Breach
- Content: The group claims to have leaked data from Shizuoka Prefecture.
- Date: 2025-10-22T14:01:52Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: shizuoka prefecture
- Victim Site: pref.shizuoka.jp
29. Alleged data leak of Taito Ward
- Category: Data Breach
- Content: The group claims to have leaked data from Taito Ward.
- Date: 2025-10-22T13:59:52Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: taito ward
- Victim Site: city.taito.lg.jp
30. Alleged data leak of Union of Kansai Governments
- Category: Data Breach
- Content: The group claims to have leaked data from Union of Kansai Governments.
- Date: 2025-10-22T13:58:15Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: union of kansai governments
- Victim Site: kouiki-kansai.jp
31. Alleged data breach of Aceville Pte. Ltd.
- Category: Data Breach
- Content: The group claims to have leaked organization’s data.
- Date: 2025-10-22T13:55:40Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/171)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Singapore
- Victim Industry: Network & Telecommunications
- Victim Organization: aceville pte. ltd.
- Victim Site: Unknown
32. Alleged data leak of Okinawa City Hall
- Category: Data Breach
- Content: The group claims to have leaked data from Okinawa City Hall.
- Date: 2025-10-22T13:49:27Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: okinawa city hall
- Victim Site: city.okinawa.okinawa.jp
33. Alleged data leak of Goho-wood
- Category: Data Breach
- Content: The group claims to have leaked data from Goho-wood.
- Date: 2025-10-22T13:49:04Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Other Industry
- Victim Organization: goho-wood
- Victim Site: goho-wood.jp
34. Alleged data leak of Okinawa Prefecture Nursing Care Insurance Association
- Category: Data Breach
- Content: The group claims to have leaked data from Okinawa Prefecture Nursing Care Insurance Association.
- Date: 2025-10-22T13:48:34Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Hospital & Health Care
- Victim Organization: okinawa prefecture nursing care insurance association
- Victim Site: okinawa-kouiki.jp
35. Alleged data leak of Tokyo Metropolitan Government
- Category: Data Breach
- Content: The group claims to have leaked data from Tokyo Metropolitan Government.
- Date: 2025-10-22T13:48:14Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: tokyo metropolitan government
- Victim Site: metro.tokyo.lg.jp
36. Alleged data leak of Yoshimura Laboratory
- Category: Data Breach
- Content: The group claims to have leaked data from Yoshimura Laboratory.
- Date: 2025-10-22T13:47:47Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/166)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Research Industry
- Victim Organization: yoshimura laboratory
- Victim Site: isotope.iis.u-tokyo.ac.jp
37. Alleged data sale of Hosteur SA
- Category: Data Breach
- Content: The threat actor claims to be selling 651.6 MB of data from Hosteur SA, allegedly containing IDs, order IDs, customer names, company names, street addresses, cities, postal codes, country IDs, phone numbers, and more.
- Date: 2025-10-22T13:44:56Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-France-135k-Name-Phone-Address-Email-73k-hosteur-com)
- Screenshots:
- Threat Actors: AgSlowly
- Victim Country: Switzerland
- Victim Industry: Information Technology (IT) Services
- Victim Organization: hosteur sa
- Victim Site: hosteur.com
38. Alleged data breach of Xerotta Co.,Ltd.
- Category: Data Breach
- Content: The group claims to have leaked organization’s data.
- Date: 2025-10-22T13:32:07Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/167)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Consumer Services
- Victim Organization: xerotta co.,ltd.
- Victim Site: xerotta.com
39. Alleged data breach of Amazon Japan
- Category: Data Breach
- Content: A recent post by the group claims to have leaked a databases and credentials from Amazon Japan.
- Date: 2025-10-22T13:23:22Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/173)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: E-commerce & Online Stores
- Victim Organization: amazon japan
- Victim Site: amazon.co.jp
40. Alleged data leak of Japan’s security policy
- Category: Data Breach
- Content: The group claims to have obtained documents revealing Japan’s shift to a more proactive defense policy, focusing on equipment transfers and international collaboration.
- Date: 2025-10-22T13:17:10Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/185)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
41. Alleged data breach of ARTERIA Networks Corporation
- Category: Data Breach
- Content: A recent post by the group claims to have leaked the databases of ARTERIA Networks Corporation. The breach reportedly contains 5.1GB databases, the leak contains measurement or simulation sensor results, or scientific data etc.
- Date: 2025-10-22T13:13:28Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/172)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Network & Telecommunications
- Victim Organization: arteria networks corporation
- Victim Site: arteria-net.com
42. Alleged Leak of Japanese Government Strategic Defense Planning and Arms Export Policy
- Category: Data Breach
- Content: The group claims to have obtained and leaked strategic policy documents from the Japanese government. The alleged documents contain sensitive information regarding defence planning, military capability development, and Japan’s arms export policy.
- Date: 2025-10-22T13:13:10Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/180)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
43. Alleged data leak of Japan Ministry of Defence
- Category: Data Breach
- Content: The group claims to have obtained classified documents from the Japanese Ministry of Defence, allegedly containing sensitive information on military weapons, missile system capabilities, radar and defence systems, budget allocations, and details of contractors and weapon systems such as AEGIS and ballistic missiles.
- Date: 2025-10-22T13:10:27Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/190)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: japan ministry of defence
- Victim Site: mod.go.jp
44. Alleged Leak of Japanese Government National Security and Export Control Training Documents
- Category: Data Breach
- Content: The group claims to have leaked internal training material from the Japanese government. This material allegedly details Japan’s national security policy and export control procedures. The accompanying text warns that the content is strategic and contains sensitive information that could harm national security.
- Date: 2025-10-22T13:10:08Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/176)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
45. KIS PRICING INC falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.1 TB of the organization’s data. The leaked information allegedly includes the organization’s financial records, budget reports, contracts, and details of investment portfolio development and modifications, etc.
- Date: 2025-10-22T13:05:05Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=c6292008-0426-320e-835c-f9f205b626df)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: South Korea
- Victim Industry: Financial Services
- Victim Organization: kis pricing inc
- Victim Site: bond.co.kr
46. Alleged data leak of an unidentified Japanese hospital in Japan
- Category: Data Breach
- Content: The group claims to have obtained medical records from an unidentified Japanese hospital, allegedly used as official templates for clinical research.
- Date: 2025-10-22T13:04:18Z
- Network: telegram
- Published URL: (https://t.me/c/3076919011/194)
- Screenshots:
- Threat Actors: CLOBELSECTEAM
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
47. Payouts King Ransomware group adds an unknown victim (T****s)
- Category: Ransomware
- Content: The group claims to have obtained 3.1 TB of the organization’s data and intends to publish it within 6 to 7 days.
- Date: 2025-10-22T12:49:54Z
- Network: tor
- Published URL: (https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/)
- Screenshots:
- Threat Actors: Payouts King
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
48. SYLHET GANG-SG claims to target the UAE
- Category: Alert
- Content: A recent post by the group, in collaboration with Dienet, claims they are targeting the UAE and they already have access to sensitive data and many servers.
- Date: 2025-10-22T12:28:49Z
- Network: telegram
- Published URL: (https://t.me/SylhetGangSG1/7064)
- Screenshots:
- Threat Actors: SYLHET GANG-SG
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
49. Alleged data breach of BrandArmy
- Category: Data Breach
- Content: The threat actor claims to have leaked SQL data of 231,000 users from BrandArmy, allegedly on 2023-05-26. The compromised data includes users, transactions, and messages.
- Date: 2025-10-22T11:54:30Z
- Network: tor
- Published URL: (http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-brandarmy-com-2023-231k-users-sql-dump)
- Screenshots:
- Threat Actors: alec3899
- Victim Country: Unknown
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: brandarmy
- Victim Site: brandarmy.com
50. Alleged unauthorized access to MekongNet
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to MekongNet.
- Date: 2025-10-22T11:37:02Z
- Network: telegram
- Published URL: (https://t.me/NigthCrawlerX/1052)
- Screenshots:
- Threat Actors: NightCrawlerX
- Victim Country: Cambodia
- Victim Industry: Network & Telecommunications
- Victim Organization: mekongnet
- Victim Site: monitor.mekongnet.com.kh
51. Alleged unauthorized access to CooTel Cambodia
- Category: Initial Access
- Content: The group claims to have gained access to CooTel.
- Date: 2025-10-22T11:33:18Z
- Network: telegram
- Published URL: (https://t.me/NigthCrawlerX/1051)
- Screenshots:
- Threat Actors: NightCrawlerX
- Victim Country: Cambodia
- Victim Industry: Network & Telecommunications
- Victim Organization: cootel
- Victim Site: cootel.com.kh
52. Alleged leak of login access to PRTR Cambodia
- Category: Initial Access
- Content: The group claims to have leaked access to PRTR Cambodia.
- Date: 2025-10-22T09:20:42Z
- Network: telegram
- Published URL: (https://t.me/NigthCrawlerX/1047)
- Screenshots:
- Threat Actors: NightCrawlerX
- Victim Country: Cambodia
- Victim Industry: Government & Public Sector
- Victim Organization: prtr cambodia
- Victim Site: prtrcambodiamoe.gov.kh
53. Alleged leak of login access to Office of Urban Planning and Development
- Category: Initial Access
- Content: The group claims to have leaked access to Office of Urban Planning and Development.
- Date: 2025-10-22T08:49:50Z
- Network: telegram
- Published URL: (https://t.me/nxbbsec/2894)
- Screenshots:
- Threat Actors: NXBB.SEC
- Victim Country: Thailand
- Victim Industry: Government & Public Sector
- Victim Organization: office of urban planning and development
- Victim Site: cpudapp.bangkok.go.th
54. Alleged unauthorized access to National Maternal and Child Health Center (NMCHC)
- Category: Initial Access
- Content: The group claims to have gained access to National Maternal and Child Health Center.
- Date: 2025-10-22T08:39:27Z
- Network: telegram
- Published URL: (https://t.me/NigthCrawlerX/1045)
- Screenshots:
- Threat Actors: NightCrawlerX
- Victim Country: Cambodia
- Victim Industry: Government Administration
- Victim Organization: national maternal and child health center
- Victim Site: nmchc.gov.kh
55. Alleged leak of login access to SIAM MULTI CONS CO LTD
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to SIAM MULTI CONS CO LTD.
- Date: 2025-10-22T08:37:32Z
- Network: telegram
- Published URL: (https://t.me/nxbbsec/2897)
- Screenshots:
- Threat Actors: NXBB.SEC
- Victim Country: Thailand
- Victim Industry: Building and construction
- Victim Organization: siam multi cons co ltd
- Victim Site: smc.in.th
56. PT Pupuk Iskandar Muda falls victim to The Gentlemen Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data. They has previously fallen victim to 8BASE Ransomware on March April 03, 2024.
- Date: 2025-10-22T06:31:27Z
- Network: tor
- Published URL: (http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion/)
- Screenshots:
- Threat Actors: The Gentlemen
- Victim Country: Indonesia
- Victim Industry: Manufacturing
- Victim Organization: pt pupuk iskandar muda
- Victim Site: pim.co.id
57. NLT Lighting Solutions falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 250 GB of organization’s sensitive data and they intends to publish the data within 3 days.
- Date: 2025-10-22T06:31:02Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=0f4e1896-6567-3b05-8cfa-48e0b0f6726d)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: Canada
- Victim Industry: Mining/Metals
- Victim Organization: nlt lighting solutions
- Victim Site: nltinc.com
58. Applied Technology Resources, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 195 GB of the organization’s data. Sample screenshots are available on their dark web portal.
- Date: 2025-10-22T06:25:39Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=be44afef-bbf4-3d16-88cd-04e761f06977)
- Screenshots:
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: applied technology resources, inc.
- Victim Site: appliedtechres.com
59. NOTRASEC TEAM targets the website of Sunwin website
- Category: Defacement
- Content: The group claims to have deface the website of Sunwin.
- Date: 2025-10-22T06:20:24Z
- Network: telegram
- Published URL: (https://t.me/c/2761195311/6098)
- Screenshots:
- Threat Actors: NOTRASEC TEAM
- Victim Country: Vietnam
- Victim Industry: Unknown
- Victim Organization: sunwin
- Victim Site: ttthdsbg.vn
60. Alleged data leak of Party 4,100 Formats
- Category: Data Breach
- Content: The threat actor claims to be leaked database of thousands of account lines being sold via auction, billed as Party 4,100 formats with large volumes and multiple country entries.
- Date: 2025-10-22T05:48:49Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/268701/)
- Screenshots:
- Threat Actors: give_s
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
61. Alleged sale of Private PSN Brute/ Checker
- Category: Malware
- Content: The threat actor offering to sell a private PSN Checker / Brute 2025— a credential-checking/brute-force tool for PlayStation Network accounts.
- Date: 2025-10-22T05:12:56Z
- Network: openweb
- Published URL: (https://demonforums.net/Thread-%E2%AD%90%EF%B8%8F-PSN-Checker-Brute-2025-%E2%AD%90%EF%B8%8F-CAPTURE-PROXYLESS-MODE-WEEKLY-UPDATE–179433)
- Screenshots:
- Threat Actors: mirax2625
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
62. Alleged leak of Multiple login access of Multiple organisations
- Category: Data Breach
- Content: The groups claims to be selling leaked of Multiple login access of multiple organisations
- Date: 2025-10-22T04:58:12Z
- Network: telegram
- Published URL: (https://t.me/c/2622575053/247)
- Screenshots:
- Threat Actors: AYAMJAGO
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
63. Kumwell Corporation PLC. falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s internal data.
- Date: 2025-10-22T01:07:32Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/68f7c786e1a4e4b3ffef6de5)
- Screenshots:
- Threat Actors: INC RANSOM
- Victim Country: Thailand
- Victim Industry: Manufacturing
- Victim Organization: kumwell corporation plc.
- Victim Site: kumwell.com
64. Southern Specialty & Supply, Inc. falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 400 GB of organization’s internal data including employee and management host data, operational records, and documents extracted from the company’s file server. Note: Southern Specialty & Supply, Inc. has previously fallen victim to LOCKBIT Ransomware on May 7, 2024.
- Date: 2025-10-22T00:46:45Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/b6a7d85979c2f1814571/)
- Screenshots:
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: southern specialty & supply, inc.
- Victim Site: southernspecialtysupply.com
65. Roth & Scholl falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The threat actor claims to have obtained 100 GB of sensitive data from the Florida law firm Roth & Scholl, including legal case files, personal information, and medical data from the firm’s internal file server. Note: Roth & Scholl has previously fallen victim to PLAY Ransomware on September 22, 2025.
- Date: 2025-10-22T00:39:27Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/83742b67b92e8bf6715c/)
- Screenshots:
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Legal Services
- Victim Organization: roth & scholl
- Victim Site: rothandscholl.com
66. Austin Capital Trust falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The threat actor claims to have obtained 500 GB of sensitive data from Austin Capital Trust Company, LLC, including personal, medical, and financial information.
- Date: 2025-10-22T00:31:01Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/0fafd516a1033618e0e0/)
- Screenshots:
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: austin capital trust
- Victim Site: austincapitaltrust.com
67. Healthy Living falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 400 GB of organization’s sensitive data including financial records, payroll information, HR and personal data, documents extracted from the company’s file server, managed folders, and network user directories.
- Date: 2025-10-22T00:30:02Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/0bda4c8c4abb98579dca/)
- Screenshots:
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Supermarkets
- Victim Organization: healthy living
- Victim Site: healthylivingmarket.com
68. RIVER CITY EYECARE, LLC falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 200 GB of organization’s internal data. The exposed data reportedly includes medical records, data from company management hosts, and various documents extracted from file servers.
- Date: 2025-10-22T00:08:48Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/2ff1a529c594105c1277c93c0a1ac15f753475c9/)
- Screenshots:
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Medical Practice
- Victim Organization: river city eyecare, llc
- Victim Site: rivercityeye.com
Conclusion
The incidents detailed in this report paint a clear picture of a highly active and diverse landscape of cyber threats over the analyzed period.
Ransomware remains a dominant threat category, with numerous organizations falling victim to groups like Qilin (11 incidents), MEDUSA (4 incidents), and GENESIS (4 incidents). These attacks spanned a variety of sectors, including Information Technology (IT) Services, Manufacturing, Real Estate, and Financial Services, affecting companies like Integral Networks, Inc. , PT Pupuk Iskandar Muda , and Austin Capital Trust. Ransomware groups routinely claim to have obtained massive amounts of sensitive data, with reported exfiltration volumes ranging up to 1.1 TB and 3.1 TB in separate incidents.
Data Breaches and Leaks were also widespread (22 incidents), significantly impacting the Government Administration sector in countries like Japan (9 incidents) and Bolivia (2 incidents). Threat actors like CLOBELSECTEAM targeted multiple Japanese government organizations, claiming to leak sensitive documents related to national security, defense planning, and export control. In Bolivia, a threat actor claimed to sell millions of records from the Ministry of Health and Sports and student data from a university. Other notable data breaches include the alleged leak of 231,000 users from BrandArmy and 30,000 customers from Rozetka.
Activity concerning the sale of Initial Access (8 incidents) highlights an ongoing market for unauthorized network entry. Threat actors specifically advertised access to:
- Forti VPN networks.
- Telecommunications companies in Cambodia (MekongNet and CooTel).
- Multiple internal systems for Thai and Cambodian Government entities.
- The CARE Management System in Saudi Arabia.
The global distribution of these incidents is broad, with the USA being the most frequently targeted country (11 incidents, primarily ransomware), followed closely by Japan (13 incidents, primarily data breaches against government entities). Cambodia (4 incidents), Saudi Arabia (3 incidents), and Thailand (3 incidents) were also prominent targets for initial access and ransomware.
Collectively, these incidents demonstrate a persistent and sophisticated cyber underground that targets vulnerabilities across diverse industries and geographies, reinforcing the need for continuous vigilance in access control, data protection, and threat intelligence.