This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Dilosa Food Companies falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data, including contracts, confidential documents, financial records, and HR files, which they intend to publish within 3-4 days.
- Date: 2025-10-29T23:23:32Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/6902936ee1a4e4b3ff9ad15a)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b17d6202-b3b1-4328-a135-e4ee1bd1d695.png https://d34iuop8pidsy8.cloudfront.net/11472de0-14e5-4cb0-a560-56f6b4cf228a.png
- Threat Actors: INC RANSOM
- Victim Country: El Salvador
- Victim Industry: Food & Beverages
- Victim Organization: dilosa food companies
- Victim Site: dilosafoods.com
- BABAYO EROR SYSTEM targets the Kabupaten Sukabumi websites
- Category: Defacement
- Content: The group claims to have defaced the Kabupaten Sukabumi websites.
- Date: 2025-10-29T23:13:19Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/416)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a254b7a7-6530-4b50-8876-c3405473662e.png https://d34iuop8pidsy8.cloudfront.net/7ac9a57c-e505-4d25-bfa8-807e3f685ca8.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Agriculture & Farming
- Victim Organization: kabupaten sukabumi
- Victim Site: diskominfosan.sukabumikab.go.id
- Alleged database leak of USA citizens
- Category: Data Breach
- Content: Threat actor claims to have leaked USA citizens data including ID, First Name, Last Name, Email, Address, City, State, ZIP, Country, Phone, Date of Birth, Gender, Marital Status, etc.
- Date: 2025-10-29T23:11:22Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-%F0%9F%87%BA%F0%9F%87%B8USA-citizens-DB-fresh-extracted-2025-10-15–57585)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8053dd27-5240-4550-a78e-c3fc715fc907.png
- Threat Actors: Cayenne
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Leak of Israeli Donor Email Addresses
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 37,500 email addresses and names allegedly belonging to donors from Israel. The data is said to be in CSV format, comprising approximately 69,401 lines.
- Date: 2025-10-29T22:56:38Z
- Network: openweb
- Published URL: https://leakbase.la/threads/37-5k-israel-donators-email-address-names.44962/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/02fb3127-4af4-49a5-98b8-acc02149dfde.png
- Threat Actors: tnuocca
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- FSB GROUP LTD. falls victim to Brain Cipher Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data
- Date: 2025-10-29T22:19:48Z
- Network: tor
- Published URL: (http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/s/FOZZeQMuNKEZbGKbHFwXcIdfAsbXFXEsrn35NxL0EEpxomDzFR8pmdYX5iTibe76c21dKwJ76QV+8lSF2h2zHBnZUViTmo3)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/28119ff5-9492-45ee-8616-281ff1ec5263.png
- Threat Actors: Brain Cipher
- Victim Country: Canada
- Victim Industry: Insurance
- Victim Organization: fsb group ltd.
- Victim Site: fsbgroup.ca
- SEMAG falls victim to Brain Cipher Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data
- Date: 2025-10-29T22:14:59Z
- Network: tor
- Published URL: (http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/s/OU4F2PgCxlTt5Y0l3nGgUemptQ6GNUOlXTFfIXloXmB79iZBiM8GSKmecPJLywUBtYyS3RdP4GdsWorDeXHySlRObEFJb0R6)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5c5bf554-df17-48dc-b64d-f129592d9c18.png
- Threat Actors: Brain Cipher
- Victim Country: France
- Victim Industry: Building and construction
- Victim Organization: semag
- Victim Site: semag.fr
- AXXIA BMW Motorrad falls victim to Brain Cipher Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data
- Date: 2025-10-29T22:09:21Z
- Network: tor
- Published URL: (http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/s/yQKGUT4rW2IA0F1GJTg+2SWPWwoyji+eHP8vtNj1ZECEBy9svi2S4Zkqqm7BDaFmoJRNsHrKmq2UCsUNae7VD2FJNDZVYlVs)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a101cb11-54ad-4cba-a046-a1e0c67861aa.png
- Threat Actors: Brain Cipher
- Victim Country: France
- Victim Industry: Retail Industry
- Victim Organization: axxia bmw motorrad
- Victim Site: axxia.fr
- Alleged dale of Admin Access to an US-based sports-betting SaaS company
- Category: Initial Access
- Content: Threat actor claims to be selling full administrative access to a US-based sports-betting SaaS company. The claim describes root SSH access to Linux servers, administrative RDP on Windows servers, access to production databases hosted on AWS and Azure, and admin cloud/accounts and code-repo keys. The listing is unverified.
- Date: 2025-10-29T21:31:04Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269231/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f34625cd-03cd-496e-8ee9-d0cb1baa7cda.png
- Threat Actors: ducreux
- Victim Country: USA
- Victim Industry: Gaming
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Multiestetica
- Category: Data Breach
- Content: Threat actor claims to be selling leaked database of Multiestetica, Spain. The compromised data reportedly contains 5.9 million records from a centralized database from multiple sites and country.
- Date: 2025-10-29T20:42:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-multiestetica-com-5-9M-row)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/42aee509-3672-44f5-9ae1-580c6da9fa7c.png
- Threat Actors: haxorsss
- Victim Country: Spain
- Victim Industry: Health & Fitness
- Victim Organization: multiestetica
- Victim Site: multiestetica.com
- Alleged Sale of Unauthorized VPN & Admin Access to Unidentified EU Pharmaceutical
- Category: Initial Access
- Content: Threat actor claims to be selling Unauthorized VPN & Admin Access to Unidentified EU Pharmaceutical.
- Date: 2025-10-29T20:41:19Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269227/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b05a947f-6e1a-49ce-99b3-9f93f0ac9631.png
- Threat Actors: thugstage
- Victim Country: Unknown
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Itaka
- Category: Data Breach
- Content: Threat actor claims to be selling leaked user data from Itaka, Poland. The compromised data reportedly contains 2.2 million records dated from 2017-2025, Including id, username, email, password, access token, name, etc.
- Date: 2025-10-29T20:29:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Poland-itaka-pl-2-2M-row)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9318edbe-23b4-47cb-ba40-4b3f0b8a0b1f.png
- Threat Actors: haxorsss
- Victim Country: Poland
- Victim Industry: Leisure & Travel
- Victim Organization: itaka
- Victim Site: itaka.pl
- Clackamas Community College falls victim to MEDUSA ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-29T20:20:50Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=9bdb54f9611190db388ff4ea05104bcc)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/279d15bb-1715-4eaf-9038-670a4eb6bfba.png
- Threat Actors: MEDUSA
- Victim Country: USA
- Victim Industry: Higher Education/Acadamia
- Victim Organization: clackamas community college
- Victim Site: clackamas.edu
- Alleged data sale of SuperGrosz
- Category: Data Breach
- Content: Threat actor claims to be selling leaked user data from SuperGrosz, Poland. The compromised data reportedly contains 1.4 million records from 2017-2025, including id, username, email, password, name, address, phone number, etc.
- Date: 2025-10-29T20:20:18Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Poland-supergrosz-pl-1-4M-row)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d958560f-a1e1-46b3-8b4d-c2c891367942.png
- Threat Actors: haxorsss
- Victim Country: Poland
- Victim Industry: Financial Services
- Victim Organization: supergrosz
- Victim Site: supergrosz.pl
- Alleged data sale of Alles-fuer-Selbermacher
- Category: Data Breach
- Content: Threat actor claims to be selling leaked customer and orders data from Germany. The compromised data reportedly contains 451,000 customer records and 983,000 order records from 2015-2025, including customer id, store id, order id, invoice no, name, email, telephone, password, etc.
- Date: 2025-10-29T19:59:31Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Germany-alles-fuer-selbermacher-de-451k-row)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dc830337-0c69-4a62-8eef-6d69e993db48.png https://d34iuop8pidsy8.cloudfront.net/42a3aa02-b7e8-41c6-9ee4-f91b61032880.png
- Threat Actors: haxorsss
- Victim Country: Germany
- Victim Industry: E-commerce & Online Stores
- Victim Organization: alles-fuer-selbermacher
- Victim Site: alles-fuer-selbermacher.de
- OpenEyes Technologies Inc. falls victim to RADAR group ransomware
- Category: Ransomware
- Content: Group claims to have obtained organization’s data.
- Date: 2025-10-29T19:42:33Z
- Network: tor
- Published URL: (http://3bnusfu2lgk5at43ceu7cdok5yv4gfbono2jv57ho74ucjvc7czirfid.onion/awaiting-publication)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ba53283b-b7db-42f1-a0e0-579600af4212.png https://d34iuop8pidsy8.cloudfront.net/b0c1683f-67cf-4e98-a9fa-6ffed135df9f.png
- Threat Actors: RADAR group
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: openeyes technologies inc.
- Victim Site: theopeneyes.com
- BABAYO EROR SYSTEM targets the website of Kecamatan Cimanggu
- Category: Defacement
- Content: The group claims to have defaced the website of Kecamatan Cimanggu.
- Date: 2025-10-29T19:32:25Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/176b97a9-2768-4b17-8030-79c5ca0283f1.png https://d34iuop8pidsy8.cloudfront.net/0a669ee6-2536-4df1-9f1f-532fe9afa136.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: kecamatan cimanggu
- Victim Site: kec-cimanggu.sukabumikab.go.id
- Alleged sale of unauthorized access to unidentified company from Сanada
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized domain admin and RDP access to an unidentified organization from Canada.
- Date: 2025-10-29T19:30:49Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269217/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fdfda16e-7f06-4c7f-939f-f26bceaf9b2b.png
- Threat Actors: DISSS
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of Kecamatan Kabandungan
- Category: Defacement
- Content: The group claims to have defaced the website of Kecamatan Kabandungan
- Date: 2025-10-29T19:14:15Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/078dea8a-e210-4bb1-99e0-027c9fbf88d2.png https://d34iuop8pidsy8.cloudfront.net/1e7a5157-e2cf-48aa-977d-bfc4e13a1cc3.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: kecamatan kabandungan
- Victim Site: kec-kabandungan.sukabumikab.go.id
- Alleged Sale of Unauthorised CRM access to an unidentified UAE real-estate organization
- Category: Initial Access
- Content: The threat actor claims to be selling Unauthorised CRM access to an unidentified UAE real-estate organization.
- Date: 2025-10-29T19:10:54Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269216/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/900e8fe4-ac95-4b75-87e8-4820ed7f14a8.png https://d34iuop8pidsy8.cloudfront.net/040eeba4-8941-4dc4-89ab-9d25ceccb575.png
- Threat Actors: betway
- Victim Country: UAE
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of Kecamatan Cidolog
- Category: Defacement
- Content: The group claims to have defaced the website of Kecamatan Cidolog.
- Date: 2025-10-29T19:01:57Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c23922d3-5510-4c95-b91a-134e692f2cf1.png https://d34iuop8pidsy8.cloudfront.net/683c0eda-625f-472e-9971-07ffe2691712.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: kecamatan cidolog
- Victim Site: kec-cidolog.sukabumikab.go.id
- BABAYO EROR SYSTEM targets the website of Pemerintah Kabupaten Sukabumi
- Category: Defacement
- Content: The group claims to have defaced the website of Pemerintah Kabupaten Sukabumi.
- Date: 2025-10-29T19:01:43Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/02e0e201-f3a9-449f-9499-8a5adc8213b9.png https://d34iuop8pidsy8.cloudfront.net/94249893-6d60-411a-9629-f439b1f2fd29.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: pemerintah kabupaten sukabumi
- Victim Site: dinas.sukabumikab.go.id
- Alleged data breach of TBM Service Group
- Category: Data Breach
- Content: Group claims to have breached the organization’s data.
- Date: 2025-10-29T18:59:06Z
- Network: tor
- Published URL: (http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/tbm)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2873ffca-ee86-47f8-838c-eec3631e9b9e.png
- Threat Actors: CoinbaseCartel
- Victim Country: Taiwan
- Victim Industry: Facilities Services
- Victim Organization: tbm service group
- Victim Site: tbmservicegroup.com
- BABAYO EROR SYSTEM targets the website of MTs Darussalam Kebonan
- Category: Defacement
- Content: The group claims to have defaced the website of MTs Darussalam Kebonan.
- Date: 2025-10-29T18:52:30Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fb2e5b58-e06b-4ceb-99b0-fbb96ef37d59.png https://d34iuop8pidsy8.cloudfront.net/6b286713-ef7f-4470-9a73-410fec0545d3.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: mts darussalam kebonan
- Victim Site: cbt.mtsdarussalamkebonan.sch.id
- Alleged Sale of Mail-Pass Access to UAE Real-Estate
- Category: Initial Access
- Content: The threat actor claims to be selling mail-pass access to UAE Real-Estate.
- Date: 2025-10-29T18:49:31Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269216/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/900e8fe4-ac95-4b75-87e8-4820ed7f14a8.png https://d34iuop8pidsy8.cloudfront.net/040eeba4-8941-4dc4-89ab-9d25ceccb575.png
- Threat Actors: betway
- Victim Country: UAE
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- BABAYO EROR SYSTEM targets the website of Madrasah Ibtidaiyah Negeri 4 Wajo
- Category: Defacement
- Content: The group claims to have defaced the website of Madrasah Ibtidaiyah Negeri 4 Wajo.
- Date: 2025-10-29T18:47:22Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d73614f2-2bc7-4f57-b652-03b0c045840b.png https://d34iuop8pidsy8.cloudfront.net/f415811e-5521-474d-918c-144e93e951ac.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: madrasah ibtidaiyah negeri 4 wajo
- Victim Site: min4wajo.schoolmadrasah.sch.id
- BABAYO EROR SYSTEM targets the website of Kecamatan Tegalbuleud
- Category: Defacement
- Content: The group claims to have defaced the website of Kecamatan Tegalbuleud.
- Date: 2025-10-29T18:36:40Z
- Network: telegram
- Published URL: (https://t.me/c/3159622829/414)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7f02bec2-c579-4d7a-be14-4a69e600800e.png https://d34iuop8pidsy8.cloudfront.net/65b1b6ab-b0b3-48a2-b21b-7d50dff4dede.png
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: kecamatan tegalbuleud
- Victim Site: kec-tegalbuleud.sukabumikab.go.id
- BASSETTI Group falls victim to Nova ransomware
- Category: Ransomware
- Content: Group claims to have obtained 416 GB of the organization’s data.
- Date: 2025-10-29T18:02:11Z
- Network: tor
- Published URL: (http://novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion/#)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/271dbfb1-3637-45e9-ae56-b38d7e2e14b5.png
- Threat Actors: Nova
- Victim Country: France
- Victim Industry: Software Development
- Victim Organization: bassetti group
- Victim Site: bassetti-group.com
- Time Equities Inc. falls victim to Payouts King ransomware
- Category: Ransomware
- Content: The group claims to have obtained 3.1 TB of the organization’s data.
- Date: 2025-10-29T17:54:48Z
- Network: tor
- Published URL: (https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/717fb41f-714e-48f8-b271-c9b310ed2f78.png
- Threat Actors: Payouts King
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: time equities inc.
- Victim Site: timeequities.com
- Alleged data leak of Bank of Jerusalem
- Category: Data Breach
- Content: Threat actor claims to have leaked data from the Bank of Jerusalem. The compromised dataset reportedly contains 950,800 records, including card numbers, addresses, CVVs, PINs, and other sensitive information.
- Date: 2025-10-29T17:45:00Z
- Network: openweb
- Published URL: https://x.com/KuncenHaxor/status/1983548789572108437
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9e39d4af-8993-4227-9945-0328fb2c0eb8.png
- Threat Actors: Kuncen Haxor
- Victim Country: Israel
- Victim Industry: Banking & Mortgage
- Victim Organization: bank of jerusalem
- Victim Site: bankjerusalem.co.il
- Alleged sale of Google Account and 254 GB of corporate data belonging to VIZ Media
- Category: Data Breach
- Content: The threat actor claims to be selling Google account and corporate data belonging to VIZ Media. The compromised data reportedly contains 254 GB ZIP export from Google Drive containing historical emails, NDAs, master licensing agreements, PDF keys, employee credentials, etc.
- Date: 2025-10-29T17:31:49Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269209/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c1615064-e241-4313-afa4-b36ec8f7898e.png https://d34iuop8pidsy8.cloudfront.net/65fede97-370a-4dae-81c3-0f86bfa2e28f.png https://d34iuop8pidsy8.cloudfront.net/c1b8833e-4a53-4330-a5b8-408d28be3a18.png https://d34iuop8pidsy8.cloudfront.net/db5873b2-b54a-464e-a407-413c9df20c6d.png
- Threat Actors: zydr3z
- Victim Country: USA
- Victim Industry: Entertainment & Movie Production
- Victim Organization: viz media
- Victim Site: viz.com
- Phillips Printing Company falls victim to Nitrogen ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-29T17:15:06Z
- Network: tor
- Published URL: (http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion/posts/6902497abddc74c3dffe6911)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/83c4676b-eefa-42d2-89e4-ba4f11ceb3ab.png
- Threat Actors: Nitrogen
- Victim Country: USA
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: phillips printing company
- Victim Site: philprint.com
- We R Family Foundation falls victim to NightSpire ransomware
- Category: Ransomware
- Content: The group claims to have obtained 45 GB of the organization’s data
- Date: 2025-10-29T16:51:36Z
- Network: tor
- Published URL: (http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/datas.php)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/697a6fd1-62d9-48c2-9386-978102c86167.png
- Threat Actors: NightSpire
- Victim Country: China
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: we r family foundation
- Victim Site: werfamilyfoundation.org
- SuperValue Co., Ltd. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 350 GB of the organization’s data.
- Date: 2025-10-29T16:35:45Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=abe224d7-988f-3a9d-9a6a-5cc91afc859a)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1abbc528-7166-4930-858a-01b4c12aed7e.png
- Threat Actors: Qilin
- Victim Country: Japan
- Victim Industry: Retail Industry
- Victim Organization: supervalue co., ltd.
- Victim Site: supervalue.jp
- Clarion Safety Systems falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained 40 GB of organization’s data.The compromised data includes Client and customers information (addresses, phones, DOB, numerous forms with personal information), employees information (DOB, phones, emails and other HR information), detailed financial information, confidential files, NDA, etc.
- Date: 2025-10-29T16:29:28Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0093bfa1-8f41-4932-a940-0d42eb510c1b.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Printing
- Victim Organization: clarion safety systems
- Victim Site: clarionsafety.com
- Tanya Creations, A Division of Unique Designs, Inc. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data
- Date: 2025-10-29T16:23:08Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=9c173832-2e3e-3b9a-b5a0-0a75a35a282b)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6ed9be94-21ec-4294-b60d-373aca2de4c5.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: tanya creations, a division of unique designs, inc.
- Victim Site: tanyacreations.com
- Alleged sale of admin access to an unidentified e-commerce store in France
- Category: Initial Access
- Content: The threat actor claims to be selling admin access to an unidentified e-commerce store in France, including a web shell and Adminer (database) access, and the ability to modify the iFrame credit-card payment integration.
- Date: 2025-10-29T16:22:01Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269201/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b9c26d60-e84f-470d-a4c0-d127ea8e33b7.png
- Threat Actors: black18
- Victim Country: France
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Chinese car owners database
- Category: Data Breach
- Content: Threat actor claims to be selling leaked Chinese car owners database. The compromised data reportedly contains 15 million rows from year 2025.
- Date: 2025-10-29T16:17:47Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-%F0%9F%87%A8%F0%9F%87%B3China-car-owners-DB-2025-9)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3cd6e134-4ac9-4676-b745-aa3b275d5102.png
- Threat Actors: Cayenne
- Victim Country: China
- Victim Industry: Automotive
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to the customer database of HSBC USA
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the customer database of HSBC USA. The compromised data includes names, addresses, Social Security numbers (SSN), dates of birth, phone numbers, email addresses, bank account details, and transaction histories.
- Date: 2025-10-29T16:14:19Z
- Network: telegram
- Published URL: https://t.me/itrussia_ib/212
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3a474d9d-9dcc-4d7d-b628-49b31766e3c0.png
- Threat Actors: IT RUSSIA
- Victim Country: USA
- Victim Industry: Banking & Mortgage
- Victim Organization: hsbc usa
- Victim Site: Unknown
- Ritz Clark & Ben-Asher LLP falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained 109 GB of the organization’s data.The compromised data includes Lots of clients documents (passports, driver licenses, social security numbers,I-9 forms, and so on), same information of employees, detailed financial information, lots of legal documents, court cases, hearings, police reports, etc.
- Date: 2025-10-29T15:57:44Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/da00d523-b6c0-44fa-87ad-5779b0042906.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Legal Services
- Victim Organization: ritz clark & ben-asher llp
- Victim Site: rcbalaw.com
- BELL Engineering, Inc. falls victim to akira ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data. The compromised data includes Clients information, employee information, detailed financial information, projects, contracts and agreements, lots of specifications and drawings, etc.
- Date: 2025-10-29T15:57:40Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ce4d6b30-87f6-45ca-8f72-6275e96e44fd.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: bell engineering, inc.
- Victim Site: bellengr.com
- Alleged sale of Vietnam citizen database
- Category: Data Breach
- Content: Threat actor claims to be selling leaked citizens database from Vietnam. The compromised data reportedly contains 39 million lines including identity number, full name, data of birth, gender, nationality, place of origin, place of residence, and date of expiry.
- Date: 2025-10-29T15:54:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-%F0%9F%87%BB%F0%9F%87%B3Vietnam-fresh-citizens-DB-2025-10-14)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/defac1d7-8e6d-45f4-b1c6-cb1492167fcf.png
- Threat Actors: Cayenne
- Victim Country: Vietnam
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Chinese airlines database
- Category: Data Breach
- Content: Threat actor claims to be selling leaked airlines database from China. The compromised data reportedly contains 24 million lines including FFP, Chinese name, Chinese title, English title, last name, first name, DOB, email, and cellphone.
- Date: 2025-10-29T15:28:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-%F0%9F%87%A8%F0%9F%87%B3China-Airlines-DB-2025-10)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/887ffbfa-2f03-40ea-bd90-f4e4415a4e02.png
- Threat Actors: Cayenne
- Victim Country: China
- Victim Industry: Airlines & Aviation
- Victim Organization: Unknown
- Victim Site: Unknown
- Price & Ramey Insurance falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization data.
- Date: 2025-10-29T15:26:24Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=29b25a8c-c983-3c14-bad2-591846b11e2d)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/927e8685-65d9-4483-ae34-3cf0b204fdef.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Insurance
- Victim Organization: price & ramey insurance
- Victim Site: priceramey.com
- Southern Specialty & Supply, Inc. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization data.
- Date: 2025-10-29T15:08:29Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=d88fe2e1-11b8-308d-82f3-dd8a13f61920)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8b82f6ac-2737-40a2-9fec-a37612f5a4d0.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: the group claims to have obtained 400 gb of organization
- Victim Site: southernspecialtysupply.com
- Alleged data breach of VirtusBet
- Category: Data Breach
- Content: The threat actor claims to be selling data from VirtusBet containing 1,280,787 records of Brazilian users. The compromised data are ID,name,email, Created in, Country, Phone1, Phone2, CPF,Inviter, Mother’s Name”,”Date of Birth,”Display Name ,Withdrawal Balance, Bonus Balance etc.
- Date: 2025-10-29T14:52:58Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269189/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/585e5557-71e6-4d77-ae73-54aa349e28e8.JPG
- Threat Actors: ronyking247
- Victim Country: Brazil
- Victim Industry: Gambling & Casinos
- Victim Organization: virtusbet
- Victim Site: virtusbet.bet
- Reese Group, Inc. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-29T14:48:50Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=645106b2-d48a-37ad-95ba-99246a582403)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/95e74c9e-1616-4ac9-9c43-4955d98c4ee2.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: reese group, inc.
- Victim Site: reesegroupinc.com
- Wright-Gardner Insurance falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 12 GB of organization’s data. The compromised data includes Clients and customers information such as financials, contacts, contracts, detailed employee information like DOB, driver licenses, phones, addresses, emails, emergency contacts, lots of confidential files, contracts and agreements, etc.
- Date: 2025-10-29T14:29:39Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/18c091cf-98d2-48cd-8f0a-81fd1932296e.jpg
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Insurance
- Victim Organization: wright-gardner insurance, inc.
- Victim Site: wrightgardner.com
- Renaissance Network Reinvent falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 100 GB of the organization’s data.
- Date: 2025-10-29T14:08:26Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=5b9e22ea-eacf-3715-a51c-c256ec3375a6)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/595c7250-2d1e-49bf-9457-c02d16c487b1.jpg https://d34iuop8pidsy8.cloudfront.net/de04bb41-8da2-4070-a26d-5abcb998e710.jpg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Consumer Electronics
- Victim Organization: renaissance network reinvent
- Victim Site: renrns.com
- Truro Cannabis falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 160 GB of the organization’s data.
- Date: 2025-10-29T14:00:09Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=5b189e19-28c5-322a-951d-1dee1ad20d1a)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8d45df89-5223-42c4-83cf-bf0254f54cab.jpg https://d34iuop8pidsy8.cloudfront.net/136f1d45-94dc-4196-9717-bb414c401ba5.jpg
- Threat Actors: Qilin
- Victim Country: Canada
- Victim Industry: Retail Industry
- Victim Organization: truro cannabis inc.
- Victim Site: trurocannabis.ca
- A. Liss & Co Inc. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 423 GB data from the organization’s data.
- Date: 2025-10-29T13:57:07Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=2d68c411-1528-3e27-a219-0df31f4564ab)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8d60a5b0-8345-42b3-accf-ac7f4be13257.jpeg https://d34iuop8pidsy8.cloudfront.net/00fa3375-f7ce-45db-8787-288d25d61451.jpeg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: a. liss & co inc.
- Victim Site: alissco.com
- Echo Lake Foods falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 300 GB of the organization’s data.
- Date: 2025-10-29T13:34:44Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=08a6dd13-c803-38ca-9d69-daa3624e4de6)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/71441c89-ee99-4391-904d-92ce5f862f8b.jpg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Food & Beverages
- Victim Organization: echo lake foods, inc.
- Victim Site: echolakefoods.com
- Chi Rho Chiropractic falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-29T13:32:08Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=56dd830f-13bc-3b14-bd09-319d9300b457)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b6610706-1c96-4589-a464-341adb4d7105.png https://d34iuop8pidsy8.cloudfront.net/31bc851a-65b5-44e4-94b0-6ec9a9d19023.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: chi rho chiropractic
- Victim Site: chirhochiropractic.com
- U.P. Engineers & Architects, Inc. falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained 534GB data from the organization’s data.
- Date: 2025-10-29T13:30:03Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=95a615f8-f7a3-38e7-aeff-fce56fadd6a4)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c0373473-0e44-4967-8e7a-9678ac596f2b.jpeg https://d34iuop8pidsy8.cloudfront.net/e9007eee-8a7c-4ae6-9cd5-62bf96edab45.jpeg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Architecture & Planning
- Victim Organization: u.p. engineers & architects, inc.
- Victim Site: upea.com
- Alleged unauthorized access to Eco termica S.r.l.
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to heating equipment control system owned by Eco termica S.r.l. in Italy. The compromised access allegedly allows control over automated process control system, burner modes, pumps and emergency alarm system.
- Date: 2025-10-29T13:20:37Z
- Network: telegram
- Published URL: (https://t.me/c/2787466017/55)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f3149b19-75e5-4975-b2bc-8964f99ee75b.JPG
- Threat Actors: РЕЗЕРВNNNM057(16)
- Victim Country: Italy
- Victim Industry: Wholesale
- Victim Organization: eco termica s.r.l.
- Victim Site: ecotermicasrl.com
- Alleged data breach of the Indonesian General Election
- Category: Data Breach
- Content: The threat actor claims to be selling data from the Indonesian General Election Commission containing 105,003,428 records. The compromised data are in a CSV archive (compressed 4 GB; uncompressed 20 GB) dated October 2023.
- Date: 2025-10-29T13:20:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-105-MILLION-KOMISI-PEMILIHAN-UMUM-INDONESIA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c8599173-b043-4256-8065-61cb00b65ddf.png
- Threat Actors: NinjaBoi
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: indonesian general election
- Victim Site: kpu.go.id
- Alleged data breach of Babu Banarasi Das University
- Category: Data Breach
- Content: The group claims to have leaked data from Babu Banarasi Das University
- Date: 2025-10-29T13:08:31Z
- Network: telegram
- Published URL: https://t.me/lunarisS3C/63
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/57160a3b-8e27-4c14-918a-08b3c015512b.png
- Threat Actors: LunarisSec
- Victim Country: India
- Victim Industry: Education
- Victim Organization: babu banarasi das university
- Victim Site: bbdu.ac.in
- Z-BL4CX-H4T targets the website of Unique Trade Line
- Category: Defacement
- Content: The group claims to have defaced the website of Unique Trade Line
- Date: 2025-10-29T12:57:25Z
- Network: telegram
- Published URL: (https://t.me/c/3027611821/106)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b1fa51e0-d3ad-4ae0-9c6a-79d6ff96a505.JPG
- Threat Actors: Z-BL4CX-H4T
- Victim Country: Bangladesh
- Victim Industry: Fashion & Apparel
- Victim Organization: unique trade line
- Victim Site: uniquetradeline.com
- Sadler, Gibb & Associates, LLC falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 65 GB of organization’s data. The compromised data includes financial data such as audit, payment details, invoices, personal financial details of employees, accounting files.
- Date: 2025-10-29T12:57:02Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c53a41a8-5645-4fbd-9f76-4e92ef1a74be.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Accounting
- Victim Organization: sadler, gibb & associates, llc
- Victim Site: sadlergibb.com
- Malibu Boats Australia falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-29T12:49:33Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=73698355-14db-38f2-8ce4-f4bf1bb13df5)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5680884a-ae2e-412c-b059-1d3ad983f022.jpeg
- Threat Actors: Qilin
- Victim Country: Australia
- Victim Industry: Manufacturing
- Victim Organization: malibu boats australia
- Victim Site: malibuboats.com.au
- Enessance Holdings Co.,Ltd falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-29T12:48:12Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=4ae9ed96-ba9a-3440-9ac6-2da77fb0d554)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0fa09001-fd62-48b1-82d0-ddf79c0c1896.jpg
- Threat Actors: Qilin
- Victim Country: Japan
- Victim Industry: Oil & Gas
- Victim Organization: enessence holdings co.,ltd
- Victim Site: enessence.co.jp
- Alleged sale of admin access to an unidentified private NAS server in USA
- Category: Initial Access
- Content: The threat actor claims to be selling admin access to a private NAS server in the USA, containing 5 TB of sensitive files.
- Date: 2025-10-29T12:44:19Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-US-private-NAS-Server-Access-%E2%80%93-Revenue-5-Million)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/449c8562-e6b4-48f5-9e5d-48e7d62c2c4b.png
- Threat Actors: Kazu
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: Unknown
- Victim Site: Unknown
- KT ALTIMEDIA falls victim to Qilin ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-29T12:34:44Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ba49a25b-8e77-3216-848d-9aab75c9306b)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a783986e-175a-4ebf-af19-209dad73d95d.jpg
- Threat Actors: Qilin
- Victim Country: Vietnam
- Victim Industry: Information Technology (IT) Services
- Victim Organization: kt altimedia
- Victim Site: altimedia.com
- Alleged data sale of Manage My Shoppe
- Category: Data Breach
- Content: The threat actor claims to be selling 3 GB of data from Manage My Shoppe in India, allegedly containing data of 1 million customers, including names, shop names, mobile numbers, email addresses, and more.
- Date: 2025-10-29T12:25:52Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Selling%C2%A0managemyshoppe-com-Database-1M-India-Private-2025-10)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/df916ebb-a5e6-4c6c-940f-69ab7974a43a.png https://d34iuop8pidsy8.cloudfront.net/6767011d-b84e-485b-956d-48579a25524e.png https://d34iuop8pidsy8.cloudfront.net/2c2ac58c-2339-4eb7-89f6-c911a04fa61d.png
- Threat Actors: Robert2025
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: manage my shoppe
- Victim Site: managemyshoppe.com
- Alleged data sale of The Savvy Accountant
- Category: Data Breach
- Content: The threat actor claims to be selling over 2.1 GB of data from The Savvy Accountant, allegedly containing sensitive client financial and tax records from 2021–2023, and is marketing the data for fraud, identity theft, ransomware targeting, competitor intelligence, and resale.
- Date: 2025-10-29T11:18:24Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-2GB-Raw-Financial-Archive-from-THESAVVYACCOUNT-CO)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/75b703d6-6894-499c-b1cf-383ccef0ec56.png https://d34iuop8pidsy8.cloudfront.net/49d359fa-e889-4411-8479-ce6f60b865f2.png
- Threat Actors: sentap
- Victim Country: USA
- Victim Industry: Accounting
- Victim Organization: the savvy accountant
- Victim Site: thesavvyaccount.co
- Bridgehead IT, LLC. falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data. The compromised data includes financial data such as audit, payment details, invoices, personal financial details of employees, accounting files.
- Date: 2025-10-29T11:18:12Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/46b41fcb-c491-438c-9ff3-82dfd3b9c402.jpg
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: bridgehead it, llc.
- Victim Site: bridgeheadit.com
- Yateem Group falls victim to Black Nevas Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data. The compromised information reportedly includes phone numbers and emails of over 9,000,000 records, as well as employee details, passports, permissions, work contracts, and insurance records.
- Date: 2025-10-29T11:09:19Z
- Network: tor
- Published URL: (http://ctyfftrjgtwdjzlgqh4avbd35sqrs6tde4oyam2ufbjch6oqpqtkdtid.onion/publications/details/ff0972ab-ac7b-414f-b038-c81301e1fd35)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a4c25236-0e93-40bf-9717-b549c9bb0cba.jpg https://d34iuop8pidsy8.cloudfront.net/4b718ccb-008b-4817-acd7-4d71c55c2634.jpg https://d34iuop8pidsy8.cloudfront.net/d61851c7-5600-4271-a87f-8e40430da3ee.jpg https://d34iuop8pidsy8.cloudfront.net/29aaa6d0-05e9-4157-aae6-164112fe4139.jpg https://d34iuop8pidsy8.cloudfront.net/66c902d4-4658-4edd-a1a6-9771cd091740.jpg https://d34iuop8pidsy8.cloudfront.net/3defc892-ec12-45c0-b8b3-9489165cbd97.jpg
- Threat Actors: Black Nevas
- Victim Country: UAE
- Victim Industry: Retail Industry
- Victim Organization: yateem group
- Victim Site: yateemgroup.com
- Alleged unauthorized access to Ranieri Impiantistica srl
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to Ranieri Impiantistica srl.
- Date: 2025-10-29T10:26:44Z
- Network: telegram
- Published URL: https://t.me/Z_ALLIANCE/878
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dad85eb7-55f4-4617-b9c5-840bbb912ecd.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: Italy
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: ranieri impiantistica srl
- Victim Site: ranierimpiantistica.it
- G&H Distributing Inc. falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data. The compromised data includes 2-9 forms with addresses, phones, emails ,information of employees, accounting files, projects, client information etc.
- Date: 2025-10-29T10:13:07Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/785e8c72-d7f1-410e-8cce-4a45674ede55.jpg
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: g&h distributing inc.
- Victim Site: ghdistributing.com
- Z-BL4CX-H4T targets the website of Ridhi Group
- Category: Defacement
- Content: The group claims to have defaced the website of Ridhi Group
- Date: 2025-10-29T09:33:01Z
- Network: telegram
- Published URL: (https://t.me/c/3027611821/104)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/85b1020f-f0ca-44aa-9691-73a092e4d560.png
- Threat Actors: Z-BL4CX-H4T
- Victim Country: India
- Victim Industry: Real Estate
- Victim Organization: ridhi group
- Victim Site: ridhigroup.com
- Alleged unauthorized access to unidentified scada system in Italy
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to unidentified scada system in Italy.
- Date: 2025-10-29T09:28:05Z
- Network: telegram
- Published URL: https://t.me/TwoNetchannel/102
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8192c158-c838-4987-b948-28366da98305.png https://d34iuop8pidsy8.cloudfront.net/f3f41d22-a671-4262-a533-8e2b26757b75.png
- Threat Actors: TwoNet
- Victim Country: Italy
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Burundi Phone Number Data
- Category: Data Breach
- Content: The threat actor has leaked a dataset containing Burundi mobile phone numbers.
- Date: 2025-10-29T06:06:28Z
- Network: openweb
- Published URL: https://leakbase.la/threads/burundi-phone-number-data.44985/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/35444eb6-6c35-447a-89f2-ca1077c27f30.png
- Threat Actors: matobe6288
- Victim Country: Burundi
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Chillicothe Metal Company falls victim to INTERLOCK Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.5 TB of dataset allegedly belonging to Pritchard Brown has been leaked on the dark web. The exposed files reportedly contain over 1.7 million documents across more than 200,000 folders, including technical designs, project documentation, contracts, and internal records.
- Date: 2025-10-29T06:06:16Z
- Network: tor
- Published URL: (http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/leaks.php)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ca75a859-dee0-435a-bea4-e5e828a74f5c.png
- Threat Actors: INTERLOCK
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: chillicothe metal company
- Victim Site: cmcousa.com
- Pritchard Brown falls victim to INTERLOCK Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.3 TB of dataset allegedly belonging to Pritchard Brown has been leaked on the dark web. The exposed files reportedly contain over 1.7 million documents across more than 200,000 folders, including technical designs, project documentation, contracts, and internal records.
- Date: 2025-10-29T06:02:17Z
- Network: tor
- Published URL: (http://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion/leaks.php)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/22429756-2e5d-477f-8ae4-c638b43a14cf.png
- Threat Actors: INTERLOCK
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: pritchard brown
- Victim Site: pritchardbrown.com
- Alleged leak of Burkina Faso Phone Number Data
- Category: Data Breach
- Content: The threat actor has leaked a dataset containing Burkina Faso mobile phone numbers.
- Date: 2025-10-29T06:01:19Z
- Network: openweb
- Published URL: https://leakbase.la/threads/burkina-faso-phone-number-data.44984/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2229a650-5e94-412d-a15d-d76f6e67afe1.png
- Threat Actors: topopow941
- Victim Country: Burkina Faso
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Cambodian phone numbers
- Category: Data Breach
- Content: The threat actor has leaked a dataset containing Cambodian mobile phone numbers.
- Date: 2025-10-29T06:00:58Z
- Network: openweb
- Published URL: https://leakbase.la/threads/cambodia-phone-number-data.44986/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5f035776-c39f-4b08-b131-895c67faad4f.png
- Threat Actors: jacare9658
- Victim Country: Cambodia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Bulgaria Phone Number Data
- Category: Data Breach
- Content: The threat actor has leaked a dataset containing Bulgarian mobile phone numbers.
- Date: 2025-10-29T05:54:30Z
- Network: openweb
- Published URL: https://leakbase.la/threads/bulgaria-phone-number-data.44983/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2a0869fb-f653-4318-ba84-57533ef48101.png
- Threat Actors: dadexi4657
- Victim Country: Bulgaria
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BEST LOG falls victim to NightSpire Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1 GB of the organization’s internal data and intends to publish it within 6 days.
- Date: 2025-10-29T05:50:50Z
- Network: tor
- Published URL: (http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f42e38b9-ad86-46df-adb9-798177357638.png
- Threat Actors: NightSpire
- Victim Country: Brazil
- Victim Industry: Transportation & Logistics
- Victim Organization: best log
- Victim Site: bestlog.com.br
- Alleged leak of Brunei Phone Number Data
- Category: Data Breach
- Content: The threat actor has leaked a dataset containing Brunei mobile phone numbers
- Date: 2025-10-29T05:50:17Z
- Network: openweb
- Published URL: https://leakbase.la/threads/brunei-phone-number-data.44982/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e75ffdb0-4cb3-4e60-b9cd-3097b4cb1e15.png
- Threat Actors: kodahe4237
- Victim Country: Brunei
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized login access to Family Adoption Programme of Yenepoya University
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to Family Adoption Programme of Yenepoya University.
- Date: 2025-10-29T04:43:20Z
- Network: telegram
- Published URL: https://t.me/CyberSquad313/11
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ef3f08a5-2276-4b19-825c-23b1dd548dfb.png
- Threat Actors: Cyber Squad 313
- Victim Country: India
- Victim Industry: Education
- Victim Organization: yenepoya university
- Victim Site: commedfap.yenepoya.edu.in
- Alleged leak of S7comm Exploit Targeting Siemens PLCs
- Category: Vulnerability
- Content: Group claims to have leaked a functional exploit targeting Siemens S7-1200 and S7-1500 PLC controllers.The code allegedly sends a malicious S7comm command to stop the CPU, halting all connected industrial processes.Siemens has not yet confirmed any active exploitation related to the leak.
- Date: 2025-10-29T04:36:09Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2162)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/04c2a043-811b-4027-b2d1-7fa332658400.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Federal Auto Holdings Berhad falls victim to Obscura Ransomware
- Category: Ransomware
- Content: The group claims to have exfiltrated 6 GB of company databases and documents including financial records, and intends to publish it within 8 days.
- Date: 2025-10-29T04:25:50Z
- Network: tor
- Published URL: (http://obscurad3aphckihv7wptdxvdnl5emma6t3vikcf3c5oiiqndq6y6xad.onion/leaks/12)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/07afaad3-679f-42c3-9c4c-e49560c31560.png
- Threat Actors: Obscura
- Victim Country: Malaysia
- Victim Industry: Automotive
- Victim Organization: federal auto holdings berhad
- Victim Site: federalauto.com.my
- Alleged leak of restricted Northrop Grumman schematics
- Category: Data Breach
- Content: Threat actor claims to be selling restricted Northrop Grumman schematics
- Date: 2025-10-29T03:58:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-%F0%9F%98%BA-RESTRICTED-NORTHROP-GRUMMAN-SCHEMATICS-LEAKED-%F0%9F%98%BA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f0332e94-d257-43f9-8f00-9f0655968241.jpeg
- Threat Actors: jrintel
- Victim Country: USA
- Victim Industry: Defense & Space
- Victim Organization: northrop grumman corporation
- Victim Site: northropgrumman.com
- Simon Property Group falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s sensitive data and intends to publish it within 11 days.
- Date: 2025-10-29T02:16:53Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=a53d1926619d10cd60882f8a264e4175)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2c89ff97-efff-4a0f-b5a2-9dc409f7a440.png
- Threat Actors: MEDUSA
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: simon property group
- Victim Site: business.simon.com
- Alleged data breach of Ferrari S.p.A.
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of private Ferrari documents and detailed sales reports, along with alleged fresh government datasets, paywalled attachments, and screenshots.
- Date: 2025-10-29T02:06:07Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-%F0%9F%90%8E-PRIVATE-FERRARI-DOCUMENTS-AND-SALES-REPORTS-%F0%9F%90%8E)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7d801a68-8618-475f-b6b5-535f71bc83e8.png https://d34iuop8pidsy8.cloudfront.net/b6cd86bd-a38e-4ada-bf1b-4d5083bdf2a4.png
- Threat Actors: jrintel
- Victim Country: Italy
- Victim Industry: Automotive
- Victim Organization: ferrari s.p.a.
- Victim Site: ferrari.com
- Alleged sale of Windscribe Checker v1.0
- Category: Malware
- Content: Threat actor is offering Windscribe Checker v1.0 a fast, console-based proxy and account validator that processes bulk Windscribe VPN account data with multithreaded performance, integrated proxy handling, retry logic, real-time Good/Bad/Error reporting, ASCII-branded terminal UI, and exportable logs; classified as a credential-validation/checker utility optimized for speed and throughput but potentially usable for large-scale account-testing, proxy-backed validation, or other abusive automation.
- Date: 2025-10-29T01:49:37Z
- Network: openweb
- Published URL: https://demonforums.net/Thread-Windscribe-Checker-by-Evil-Bane
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eb2ed554-5696-4b18-acd4-673013816dcd.png
- Threat Actors: Starip
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of highly confidential military intelligence data from multiple countries
- Category: Data Breach
- Content: Threat actor claims to be selling highly confidential military intelligence data from multiple countries, including the U.S., U.K., China, Taiwan, India, Pakistan, and Russia.
- Date: 2025-10-29T01:49:00Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%E2%99%9E-TOP-SECRET-CONFIDENTIAL-MILITARY-DATA-FOR-SALE-UK-US-CN-TW-ETC-%E2%99%9E–57507)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e5134c58-4353-4886-abd4-7875ba6fdb4d.png https://d34iuop8pidsy8.cloudfront.net/f0146beb-6f63-4b6c-bc9b-48fe69939171.png https://d34iuop8pidsy8.cloudfront.net/cd99e66c-5995-4c8e-a48e-014542582b6a.png
- Threat Actors: jrintel
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of credit card data from US
- Category: Data Breach
- Content: A threat actor claims to be selling a database containing 389 credit cards from the US
- Date: 2025-10-29T01:43:29Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/269156/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/94ab4134-b3cb-46b2-88dd-0063777ad12a.png
- Threat Actors: Seller123456
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- MasTec falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s sensitive data
- Date: 2025-10-29T01:38:44Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/mastec-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3ef06fbe-ed6f-4c06-b41d-7ce42a4e16d2.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: mastec
- Victim Site: mastec.com
- Spijkermat falls victim to Radiant Group Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data
- Date: 2025-10-29T00:29:38Z
- Network: tor
- Published URL: (http://trfqksm6peaeyz4q6egxbij5n2ih6zrg65of4kwasrejc7hnw2jtxryd.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/70a8b2f6-5f2f-4172-ba88-db240a1ef861.png
- Threat Actors: Radiant Group
- Victim Country: Netherlands
- Victim Industry: Health & Fitness
- Victim Organization: spijkermat
- Victim Site: spijkermat.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats.
Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.