[October-7-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Alleged Sale of AscendEX (BitMax) User Database

  1. Alleged Sale of Ourbit Crypto Exchange User Database
  • Category: Data Breach
  • Content: The threat actor claims to be selling a database containing personal details of approximately 62,000 active users of the Ourbit Crypto Exchange. The leaked data reportedly includes user’s full names, email addresses, and phone numbers.
  • Date: 2025-10-07T22:12:57Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/267762/)
  • Screenshots:
  • Threat Actors: btcokiz
  • Victim Country: UK
  • Victim Industry: Financial Services
  • Victim Organization: ourbit exchange
  • Victim Site: ourbit.com

  1. Pharaoh’s Team targets multiple Indian websites

  1. Rocket Stores falls victim to CHAOS Ransomware

  1. United Pacific falls victim to CHAOS Ransomware

  1. indie.inc falls victim to CHAOS Ransomware

  1. Alleged Data Breach of Full Disclosure Policy Portal

  1. Alleged data sale of iberclimagas

  1. Alleged data leak of Montbéliard

  1. Alleged data sale of National Union of Israeli Students

  1. Alleged leak of Ministry of Foreign Affairs and International Cooperation
  • Category: Data Breach
  • Content: The group claims to have leaked login credentials of Ministry of Foreign Affairs and International Cooperation.
  • Date: 2025-10-07T18:58:57Z
  • Network: telegram
  • Published URL: (https://t.me/fornetcloud/2829)
  • Screenshots:
  • Threat Actors: FORNET ORG
  • Victim Country: Italy
  • Victim Industry: Government Administration
  • Victim Organization: ministry of foreign affairs and international cooperation
  • Victim Site: serviziconsolari.esteri.it

  1. Kronospan falls victim to Nova Ransomware

  1. Alleged data breach of Loudoun County Republican Committee

  1. BCR Recovery and Mediation falls victim to Qilin Ransomware

  1. Alleged Data Breach of Ministry of Defense ( Israel )

  1. One law firm in Canada falls victim to ANUBIS Ransomware

  1. Alleged data leak of Coins for College

  1. Alleged leak of Efisystem Srl login credentials

  1. Alleged Sale of RDP Access to Japanese Automotive Software Company

  1. BABAYO EROR SYSTEM targets the website of Serial Immo

  1. California Golf Club of San Francisco falls victim to Qilin Ransomware

  1. Alleged gain of access to Sky News

  1. Alleged Sale of unauthorized administrator access to a Spanish e‑commerce site

  1. Car Bernhard falls victim to Qilin Ransomware

  1. Alleged gain of access to ZDC Fashion

  1. Alleged gain access to multiple organization websites

  1. Massachusetts Bay Community College falls victim to Qilin Ransomware

  1. J. Lorber Company falls victim to akira Ransomware

  1. SYLHET GANG-SG targets the website of Jewish Unity Through Diversity

  1. Harbor Diesel and Equipment, Inc. falls victim to akira Ransomware

  1. Alleged unauthorized access to Thailand Golf Booking

  1. Lux Actuaries & Consultants falls victim to MEDUSA Ransomware

  1. Alleged Sale of Romanian Credential Data
  • Category: Data Breach
  • Content: The group claims to have obtained and is selling complete SQL data comprising Romanian user credentials. The sample data structure they provided indicates the set includes highly detailed personal and professional information, such as login id, api key, gender, lastname, frstname, address, zip, town, fk country, birth place, job, office phone, personal mobile and email.
  • Date: 2025-10-07T14:11:31Z
  • Network: telegram
  • Published URL: (https://t.me/chipercoreteam01/7)
  • Screenshots:
  • Threat Actors: CipherCore Team
  • Victim Country: Romania
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged Sale of Indonesian Credential Data
  • Category: Data Breach
  • Content: The group claims to have leaked and is offering for sale complete SQL data containing Indonesian user credentials. The advertised data includes sensitive fields such as name, email, username, phone number, password, two factor secret, and two factor recovery codes.
  • Date: 2025-10-07T14:05:25Z
  • Network: telegram
  • Published URL: (https://t.me/chipercoreteam01/6)
  • Screenshots:
  • Threat Actors: CipherCore Team
  • Victim Country: Indonesia
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged unauthorized access to Ukrainian Store Management System

  1. Alleged unauthorized access to an unidentified food processing facility in Israel

  1. Alleged unauthorized access to unidentified Czech Heating Control System

  1. INDOHAXSEC claims to target Israeli cyberspace

  1. Asahi Group Holdings, Ltd. falls victim to Qilin Ransomware

  1. Alleged unauthorized access to an unidentified control panel of Liquefied natural gas in Poland

  1. Alleged data breach of STNet, Incorporated

  1. INDOHAXSEC targets multiple websites

  1. Alleged data breach of World of Warcraft and Blizzard

  1. Legion targets the website of Synapse5

  1. Alleged leak of Active Israeli Phone Numbers

  1. GenZRisingNepal targets the website of Nepal Disaster Risk Reduction Portal

  1. Alleged unauthorized access to KOPERS System in Saint‑Rose

  1. Legion targets the website of Radek Buk

  1. Alleged Leak of 1.5 Million Israeli Residents’ Data

  1. V FOR VENDETTA CYBER TEAM claims to target multiple countries

  1. INDOHAXSEC targets multiple websites

  1. Lautrec Ltd. falls victim to Akira Ransomware
  • Category: Ransomware
  • Content: The group claims to have obtained 18 GB of the organization’s data. The compromised data includes financial data (audit, payment details, financial reports, invoices), employees and customers information (passports, driver’s license, Social Security Numbers, birth certificates, emails, phones) confidential information and other documents with detailed personal information.
  • Date: 2025-10-07T10:51:26Z
  • Network: tor
  • Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
  • Screenshots:
  • Threat Actors: akira
  • Victim Country: USA
  • Victim Industry: Real Estate
  • Victim Organization: lautrec ltd.
  • Victim Site: lautrecltd.com

  1. Public Hacktivist targets the website of Dodson Natural Pharmacy

  1. HEZI RASH claims to target Iran

  1. Alleged data breach of Taldor

  1. Alleged data breach of KOHEP

  1. Alleged data breach of Nigerian and Canadian Business Network

  1. Alleged data breach of BIGLOBE Inc.

  1. Alleged data breach of IDC Frontier Inc.

  1. Alleged data leak of Smart City Plaza

  1. Alleged data leak of 50PLUS Emmen

  1. Alleged data leak of International Fellowship of Birdwatching Rotarians (IFBR)

  1. Alleged data leak of Findmino

  1. Alleged data leak of Rapenburg Chamber Orchestra

  1. Alleged data leak of France biotech

  1. Alleged data leak of Les Ambassadeurs de Mulhouse Sud Alsace

  1. Alleged data breach of Job Service

  1. Alleged data leak of MediaConcept

  1. Alleged data leak from an unidentified server in Israel

  1. Choithrams falls victim to Black Nevas

  1. Alleged data breach ofSecretaría de Educación Pública (SEP)

  1. Alleged data breach of Superior Court of Justice of Lima Norte

  1. Alleged data breach of DepEd Aurora

  1. NightCrawlerX targets the website of C-TECH Chanaphonkhan Technology College

  1. LightSec targets the website of Grupo Torres Center Lda.

  1. Alleged leak of login access to Departmental Personnel Information System (DPIS) – Ministry of Interior
  • Category: Initial Access
  • Content: The group claims to have leaked unauthorized login access to Human Resource Information System (HRIS) portal operated by Thailand’s Ministry of Interior (MOI), used for managing personnel data across provincial and central government departments.
  • Date: 2025-10-07T04:20:49Z
  • Network: telegram
  • Published URL: (https://t.me/nxbbsec/2794)
  • Screenshots:
  • Threat Actors: NXBB.SEC
  • Victim Country: Thailand
  • Victim Industry: Government & Public Sector
  • Victim Organization: ministry of interior (moi)
  • Victim Site: dpis.moi.go.th

  1. Alleged leak of admin access to Universidad Salesiana (UNISAL)

  1. Alleged unauthorized access to an unidentified organization in Japan

  1. Alleged leak of login crendentials from NetVoiss Chile

  1. Alleged data breach of Terminales Portuarios Peruanos

  1. Alleged leak of multiple login credentials from Swap Energía S.A

  1. Alleged leak of login crendentials from Timely

  1. Alleged leak of multiple login credentials from Nexus Energía, S.A.

  1. Alleged leak of login crendentials from BiGO IPTV.

  1. Alleged leak of multiple login credentials from PAI

  1. Alleged data leak of Programa de Apoyo a la Internacionalización (PAI)

  1. Alleged leak of credentials from Amperios

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats, strictly based on the provided information. Data breaches and Ransomware attacks remain prominent, targeting sectors from Financial Services and Retail to Government and Education across various geographies, with a notable concentration in the USA, Israel, and Japan. Initial Access broker activity is also observed, with threat actors selling access to corporate and critical infrastructure systems. The compromised data ranges from personal user information and credentials to financial records, internal data archives, and large customer databases, underscoring the persistent and varied threats faced by organizations globally.