[October-28-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. WarmBlue falls victim to Sinobi ransomware

  1. Florida-Spectrum Environmental Services falls victim to Sinobi ransomware

  1. Alleged sale of Spain database

  1. Alleged sale of financial data from China

  1. Alleged leak of admin credentials of SUB100 Sistemas

  1. Alleged leak of admin credentials of Virtualpos

  1. Alleged leak of admin credentials of CPAGrip.com

  1. Alleged leak of admin credentials of IEB Global

  1. Eligibility Tracking Calculators falls victim to BlackShrantac ransomware

  1. Alleged leak of admin credentials to Radcore

  1. Heimbrock falls victim to GENESIS ransomware

  1. Alleged gain of access to the FTP server of DREAM GLUTEN FREE S.R.L.

  1. Alleged sale of Solana SPL Token Hijacker

  1. DEVMAN 2.0 ransomware group adds an unknown victim(rp**flwa*ps.com)

  1. Alleged sale of Web Servers Remote Shell Tool

  1. Family Health West falls victim to DEVMAN 2.0 ransomware

  1. ALIOS FINANCE falls victim to INC RANSOM ransomware

  1. Alleged leak of data on 50K million Canadian leads

  1. Alleged sale of admin access and card-payment redirect to unidentified online store in Spain

  1. Alleged unauthorized access to U.S. fuel systems

  1. Golden falcon claims to target USA

  1. Gemini Group falls victim to RHYSIDA ransomware

  1. Lorber, Greenfield & Polito, LLP falls victim to Qilin ransomware

  1. Alleged data breach of Roche

  1. Alleged sale of unauthorized shell access to an unidentified online store

  1. Henry Raymond & Thompson falls victim to PLAY ransomware

  1. Evogence falls victim to PLAY ransomware

  1. Alleged Sale of SK Telecom

  1. Super Quik falls victim to PLAY ransomware

  1. Fast Freight falls victim to PLAY ransomware

  1. Aphase II inc. falls victim to PLAY ransomware

  1. Kitchen Design Concepts falls victim to PLAY ransomware

  1. Alleged Sale of Israeli Nuclear Warhead Documents

  1. Furniture Plus falls victim to PLAY ransomware

  1. Ouranos falls victim to PLAY ransomware

  1. HMEI7 targets the website of Shri Ram Charitable Trust

  1. Alleged sale of admin panel and shell access to an unidentified online store

  1. Boyer falls victim to akira ransomware

  1. BK Technologies Inc. falls victim to Akira ransomware
  • Category: Ransomware
  • Content: The group claims to have obtained more than 25 GB of the organization’s data. The compromised data includes Employees information (phones, emails, addresses, medical cards and so on) accounting and financials, lots of confidential agreements, military contracts, contracts with BOSCH and other companies, NDA, credit card information, payment details, etc.
  • Date: 2025-10-28T14:56:04Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Network & Telecommunications
  • Victim Organization: bk technologies inc.
  • Victim Site: bktechnologies.com

  1. Alleged sale of unauthorized RDP accesses

  1. Alleged sale of admin access to Dolphin Travel Agency

  1. Microbix falls victim to Qilin ransomware

  1. Alleged sale of admin access to EGSHOP

  1. CESO, INC. falls victim to Akira Ransomware

  1. Alleged sale of admin access to Abir Shop

  1. Alleged sale of admin access to EBET

  1. Alleged sale of admin access to beisbolito.bet

  1. Z-BL4CX-H4T targets the website of Nursing Journal of India

  1. Alleged sale of bank leads from multiple country

  1. Productive Tool Products falls victim to Qilin ransomware

  1. Alleged sale of database from Spain

  1. Z-BL4CX-H4T targets multiple US websites

  1. BDG Law Group falls victim to Akira Ransomware
  • Category: Ransomware
  • Content: The group claims to have obtained 110 GB of the organization’s data. The compromised information reportedly includes employees and clients information such as phones, emails, addresses, driver licenses, passports, social security numbers, confidential legal files, court hearings, police reports, medical information, accounting and financials, NDA, etc.
  • Date: 2025-10-28T13:21:27Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Law Practice & Law Firms
  • Victim Organization: bdg law group
  • Victim Site: bdgfirm.com

  1. Z-BL4CX-H4T targets the website of Naloxone Box

  1. RASHTRIYA CYBER SENA targets the website of Saidpur Cantonment Board

  1. Alleged sale of admin access to Embiz.ae

  1. Alleged data sale of Central Bank of The UAE

  1. Axelson Williamowsky Bender & Fishman P.C. falls victim to Akira Ransomware
  • Category: Ransomware
  • Content: The group claims to have obtained 100 GB of the organization’s data. The compromised information reportedly includes financial data such as audit, payment details, financial reports, invoices, detailed employees and customers information (passports, driver’s license , Social Security Numbers, medical information, emails, phones) confidential information, NDAs and other documents with detailed personal information.
  • Date: 2025-10-28T11:13:51Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Legal Services
  • Victim Organization: axelson williamowsky bender & fishman p.c.
  • Victim Site: awbflaw.com

  1. Z-BL4CX-H4T targets the website of Viajes DQ

  1. Riddell Law Group falls victim to PEAR Ransomware

  1. Alleged data leak of Coinbase

  1. Alleged gain of access to the control panel of Cantine del Notaio

  1. Alleged data sale of IDLabz

  1. Alleged leak of access to Keflon Fine Products

  1. Alleged sale of Wasp

  1. M A D G H O S T targets the website of Femina Care

  1. Alleged unauthorized access to a unidentified company

  1. Jimfor, S.A. falls victim to Ciphbit Ransomware

  1. Fatimion Cyber Team targets U.S. critical sectors

  1. Hutchison Ports Duisburg GmbH falls victim to CHAOS Ransomware

  1. Alleged leak of City West Housing Trust

  1. Alleged leak of Ferrari Data

  1. Pharaoh’s Team targets multiple websites

  1. Advantage CDC falls victim to GENESIS Ransomware

  1. Kipp & Christian, P.C. falls victim to GENESIS Ransomware

  1. Alleged Unauthorized Access to a U.S.-Based Organic Waste Processing System
  • Category: Initial Access
  • Content: A group claims to have gained unauthorized access to a U.S.-based system managing organic waste processing facilities. The system reportedly controls feed pumps, separators, and digestate pumps operating in full automatic mode via variable frequency drives (VFDs). The attackers allege the ability to influence system functions and monitor operations remotely
  • Date: 2025-10-28T00:39:05Z
  • Network: telegram
  • Published URL: (https://t.me/n2LP_wVf79c2YzM0/2128)
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: USA
  • Victim Industry: Renewables & Environment
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Cohen’s Fashion Optical falls victim to Sinobi Ransomware

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats, all reported on 2025-10-28.

Ransomware remains a major concern, with groups like PLAY (8 victims), Akira (4 victims), GENESIS (3 victims), and Sinobi (3 victims) listing victims from multiple industries, predominantly in the USA, but also in Canada, Tunisia, Panama, Germany, and the UK. Compromised data volume ranges from 15 GB to a massive 1.7 TB, often including highly sensitive information such as personal employee/client data, financials, legal files, and medical records.

Initial Access sales are also significant, with threat actors offering administrative and shell access to organizations across Brazil, Chile, Argentina, USA, South Korea, Bangladesh, UAE, Sweden, and Spain. The sectors targeted include IT Services, E-commerce, Financial Services, and even government/critical systems like U.S. fuel and waste processing.

Data Breaches involve the alleged sale of large datasets, notably from the Central Bank of the UAE, SK Telecom (South Korea), and Ferrari S.p.A. (Italy), alongside leaks of country-specific databases for Spain, China, Canada, and an alleged sale of Israeli Nuclear Warhead Documents.

Defacement activity targeted sites in India, USA, Bangladesh, and Israel. Finally, the sale of specialized Malware, such as a Solana SPL token hijacker and a macOS infostealer, underscores the availability of offensive tools in the cyber underground.