[October-31-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Spa TMF Logistics falls victim to INC RANSOM Ransomware

  1. TwoNet Group claims to target America

  1. Alleged data breach of TISZA Világ

  1. Alleged data breach of Aviatrix

  1. Alleged data breach of Amina Hospital

  1. Alleged sale of Italian vehicle ownership documents
  • Category: Data Breach
  • Content: The threat actor claims to be selling scans and photos of documents related to the ownership of a vehicle registered in Italy. The dataset allegedly includes ID cards (both sides), a car purchase agreement, a digital ownership certificate, a declaration of sale, and commercial register documents.
  • Date: 2025-10-31T20:17:07Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/269383/)
  • Screenshots:
  • Threat Actors: Radik_c_VF
  • Victim Country: Italy
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Adamson Ahdoot LLP falls victim to INC RANSOM ransomware

  1. Alleged sale of Chinese citizens data

  1. Alleged sale of access to unidentified company from Switzerland

  1. Alleged sale of access to unidentified company from Canada

  1. Alleged sale of Airbus database

  1. Alleged data breach of ValueText in México

  1. Alleged sale of 1.1M+ records of myclubmarriott.com and gms-group.com

  1. Alleged sale of UK database

  1. Alleged Data sale of Spain Citizen’s data

  1. Alleged sale of customer records from a US Business Intelligence (BI) software company

  1. Alleged sale of multiple WordPress accesses

  1. Alleged leak of USA front and back Id card and selfie

  1. Alleged sale of admin panel and shell access to an unidentified online stores

  1. Alleged sale of Pakistan ISI leaders personal data

  1. Alleged sale of French credit cards data
  • Category: Data Breach
  • Content: A threat actor claims to be selling 150 French credit card records with a reported 90%+ validity rate. The actor states that the cards were recently obtained through sniffing activity. The compromised data reportedly contains name, address, city, zip, phone, email.
  • Date: 2025-10-31T15:34:57Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/269367/)
  • Screenshots:
  • Threat Actors: Cleverly
  • Victim Country: France
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. HOLTZ OFFICE SUPPORT falls victim to SAFEPAY Ransomware

  1. Alghanim International falls victim to RADAR group ransomware

  1. Alleged database leak of Kenya Medical Practitioners and Dentists Council

  1. Alleged database leak of Japanese citizens

  1. RASHTRIYA CYBER SENA targets the website of CT Bazar

  1. Alleged sale of WormGPT

  1. Alleged leak of US military documents

  1. RipperSec claims to target UAE

  1. Alleged sale of credit card data from multiple countries

  1. Alleged breach of energy infrastructure in Ukraine and Germany
  • Category: Data Breach
  • Content: The group claims to have targeted the energy infrastructure of Ukraine and Germany. Five power plants were allegedly compromised, each with an average capacity exceeding 500 kW. The intrusion reportedly caused equipment overheating and thermal overloads, triggering automatic shutdown protocols in combined heat and power (CHP) units. As a result, the affected systems were taken offline, leading to significant operational disruption across multiple energy facilities.
  • Date: 2025-10-31T13:27:57Z
  • Network: telegram
  • Published URL: (https://t.me/itarmyofrussianews/268)
  • Screenshots:
  • Threat Actors: IT ARMY OF RUSSIA
  • Victim Country: Germany
  • Victim Industry: Energy & Utilities
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged data breach of Expro

  1. Alleged unauthorized access to industrial control system of Gajarda s.r.l. in Italy

  1. NCT [NTB CYBER TEAM] targets the website of BITV

  1. Alleged data breach of Rumah Sakit Umum Daerah Cilacap

  1. Alleged leak of admin credentials of VietnamPost

  1. HomeTown Credit Union falls victim to akira ransomware

  1. RASHTRIYA CYBER SENA targets the website of Zipxgo

  1. Z-BL4CX-H4T targets the website of FMPB

  1. Alleged data breach of OleconOle

  1. Alleged sale of unidentified military database

  1. Alleged sale of Shopping Delivery Address Database in China

  1. Alleged leak of admin credentials of Supreme Court of the Republic of Indonesia
  • Category: Initial Access
  • Content: The group claims to have leaked admin credentials to Supreme Court of the Republic of Indonesia
  • Date: 2025-10-31T10:53:12Z
  • Network: telegram
  • Published URL: (https://t.me/teamRcs/39)
  • Screenshots:
  • Threat Actors: RASHTRIYA CYBER SENA
  • Victim Country: Indonesia
  • Victim Industry: Government Administration
  • Victim Organization: supreme court of the republic of indonesia
  • Victim Site: mahkamahagung.go.id

  1. KAL EGY 319 targets the website of Lecxo

  1. Alleged data breach of KNOWNSEC

  1. Alleged sale of database in Russia

  1. CCI Tax Pros falls victim to BlackShrantac ransomware

  1. Gun Accessory Supply falls victim to Qilin ransomware

  1. VZW Avalon falls victim to INC RANSOM Ransomware

  1. Alleged data breach of Suvidha Supermarket

  1. Alleged data breach of SVisual

  1. The Matlusky Firm LLC falls victim to BlackShrantac

  1. Alleged data breach of InWebsiteBuilder

  1. Tenax Law Group, P.C. falls victim to BlackShrantac Ransomware

  1. Cypark Resources Berhad falls victim to BlackShrantac Ransomware

  1. Alleged data breach of Ministry of Foreign Affairs, Republic of China (Taiwan)

  1. Alleged data breach of Kimia Farma

  1. Verdugo Hills Dental Group falls victim to Mydata/Alphalocker Ransomware

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats, strictly based on the provided data. Data breaches and leaks are prominent, affecting various sectors from Transportation & Logistics and Software Development to Hospital & Health Care and Law Practice & Law Firms, and impacting countries including USA, China, India, Indonesia, Spain, and Germany. The compromised data ranges from personal user information, credit card data, and delivery addresses to Source Code, legal case files, financial records, and classified military equipment details. Beyond data compromise, the report also reveals significant activity in Initial Access sales, with threat actors offering unauthorized access to FTP servers, WordPress admin accounts, and even an industrial control system in Italy. The sale of malware (like WormGPT) further underscores the availability of offensive capabilities in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools.