[October-9-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


1. Tonga Power Limited (TPL) falls victim to INC Ransom Ransomware


2. NextGen Mold Technologies Inc. falls victim to INC Ransom Ransomware


3. Alleged leak of admin access to an BitCoin PayPal Protection Program


4. Georgetown Brewing Company falls victim to INC Ransom Ransomware


5. Alleged sale of access to unidentified construction company from Kuwait


6. Alleged data breach of Action Currency


7. Uvalde CISD falls victim to Qilin Ransomware


8. INDOHAXSEC targets the website of Doctor Fitness


9. EBA Engineering, Inc. falls victim to CHAOS Ransomware


10. MSS Solutions, LLC falls victim to CHAOS Ransomware


11. Alleged sale of fullz data


12. Black Rabbit targets the website of Telangana State Portal


13. Accelerated, Inc. falls victim to PLAY Ransomware


14. NOTRASEC TEAM targets the website technomehdi.com


15. NOTRASEC TEAM targets the website of Madrasatii


16. NOTRASEC TEAM targets the website groupesosim.com


17. NOTRASEC TEAM targets the website amrichauffe.com


18. Elmer W. Davis, Inc. falls victim to PLAY Ransomware


19. Alleged data sale of V-comp


20. Alleged sale of Nigerian Navy leaked Documents


21. Alleged data sale of 7dreamsport


22. Alleged sale of US Military Leaked Documents


23. Alleged data sale of Accordbank


24. Alleged sale of FBI UAV Bird Schematics


25. Alleged admin access sale of an unidentified shop in Switzerland


26. Alleged data sale of KFC (Venezuela)


27. Alleged admin access sale of an unidentified shop in Spain


28. Alleged sale of abcproxy.com Brute & Checker


29. Northern Air Systems falls victim to akira Ransomware


30. Alleged data sale of ZoomInfo

  • Category: Data Breach
  • Content: The threat actor claims to be selling a database from ZoomInfo. The compromised data reportedly contains 185 millions records that includes USA verified business/personal contacts, Linkedin, positions, Industry, revenues, etc.NB: The organization was previously breached on Sep 12 2025.
  • Date: 2025-10-09T16:13:50Z
  • Network: openweb
  • Published URL: (https://forum.exploit.in/topic/267890/)
  • Screenshots:
  • Threat Actors: Mallory
  • Victim Country: USA
  • Victim Industry: Software Development
  • Victim Organization: zoominfo
  • Victim Site: zoominfo.com

31. Alleged data breach of Nexa DPM


32. Alleged sale of shell access to PrestaShop in france


33. Midsun Group, Inc. falls victim to Qilin Ransomware


34. Alleged data breach of Deped Tayo Ilocos Norte


35. Alleged sale of Credit Card data from Turkey


36. RipperSec targets the website of InterSpace Ltd.



38. Retail Texas falls victim to Radiant Group Ransomware


39. Alleged data breach of insafshop.com

  • Category: Data Breach
  • Content: “The threat actor claims to be selling a database allegedly containing customer information belonging to InsafShop Bangladesh. The leaked dataset reportedly includes around 10,000 records with customer IDs, warehouse details, names, email addresses, contact numbers, tax numbers, and postal information.
  • Date: 2025-10-09T14:31:22Z
  • Network: openweb
  • Published URL: (https://darkforums.st/Thread-DATABASE-BD-insafshopbd-com)
  • Screenshots:
  • Threat Actors: Yrrrr
  • Victim Country: Bangladesh
  • Victim Industry: E-commerce & Online Stores
  • Victim Organization: insafshop.com
  • Victim Site: insafshopbd.com

40. Alleged database sale of Pure Incubation Ventures

  • Category: Data Breach
  • Content: The threat actor claims to be selling a database allegedly belonging to Pure Incubation Ventures, containing over 132 million records. The leaked data reportedly includes personal and corporate details such as names, emails, phone numbers, addresses, job titles, and company information.
  • Date: 2025-10-09T14:27:10Z
  • Network: openweb
  • Published URL: (https://leakbase.la/threads/pureincubation-132m.44255/)
  • Screenshots:
  • Threat Actors: jacksparrow874
  • Victim Country: USA
  • Victim Industry: Marketing, Advertising & Sales
  • Victim Organization: pure incubation ventures
  • Victim Site: pureincubation.com

41. Alleged data breach of Partai Keadilan Sejahtera


42. UK Rail Services falls victim to Radiant Group Ransomware


43. Alleged breach of unidentified Iraqi FTTH organization


44. Ntiva, Inc. falls victim to Qilin Ransomware


45. Alleged Sale of Indian E-commerce Database


46. Alleged data breach of OMH SCIENCE Group Co., Ltd.


47. Alleged data breach of Progress Party


48. V FOR VENDETTA CYBER TEAM claims to target multiple countries


49. Ceresco falls victim to Akira Ransomware


50. Kal Egy 319 targets the website of Dar Al-Bashaer Islamic



52. Alleged data breach of Motility Software Solutions


53. Alleged data breach of Orion Communications and Public Relations


54. Alleged data breach of UVJ Technologies Pvt Ltd


55. Kal Egy 319 targets the website of Ibn Hazm Publishing House


56. Alleged data breach of Kevmor


57. Alleged data breach of Sternthal Montigny Greenberg St-Germain LLP


58. Alleged data breach of CISWO


59. Kal Egy 319 targets the website of Dental Rehabilitation Center


60. Kal Egy 319 targets the website of Fabrication-Drawings



62. Kal Egy 319 targets the website of AfaaQ


63. Alleged data breach of Magyar Érmebolt


64. HEZI RASH claims to target Azerbaijan


65. WOLF CYBER ARMY targets the website of SMA Cendana Pekanbaru


66. Alleged Sale of U.S. Credit Card Records


67. Alleged data sale of Ambon City Department of Population and Civil Registration


68. Alleged leak of multiple user login credentials of Saudi Ministry of Interior


69. Edelman & Edelman, P.C falls victim to Qilin Ransomware


70. Alleged data breach of Heritage Communities


71. INDOHAXSEC targets the website of Kid Jump


72. Alleged leak of Radio user data in Brazil


73. Alleged data leak of Afgan passports

  • Category: Data Breach
  • Content: The threat actor claims to have published a collection of sensitive documents, including passports, driver’s licenses, ID cards, and business records. Moderators and relevant authorities are being notified to investigate and contain any potential harm.
  • Date: 2025-10-09T06:36:11Z
  • Network: openweb
  • Published URL: (https://darkforums.st/Thread-Afghan-passport)
  • Screenshots:
  • Threat Actors: Arnoldsudney123
  • Victim Country: Afghanistan
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

74. Alleged data sale of Malaysian ID cards and bank statements


75. ARCHWAY falls victim to CHAOS Ransomware


76. Dun & Bradstreet falls victim to CHAOS Ransomware


77. Alleged sale of admin access to an unidentified wordpress shop from Brazil


78. Personal Collection falls victim to The Gentlemen Ransomware


79. INDOHAXSEC targets the website of Eilat Info


80. Roxu cranes falls victim to Space Bears Ransomware


81. INDOHAXSEC targets the website of Innovative Craftx


82. Alleged data leak of HOT GUNS firearms dealer database

  • Category: Data Breach
  • Content: The threat actor claims to have leaked a sensitive dealer and customer database tied to the firearms licensee “HOT GUNS” (FFL ID: 367000077M52528). The exposed dataset reportedly includes dealer details (license name, FFL ID, address, phone), customer names, phone numbers, contact addresses, transaction records (including NICS responses and final transaction status), NTN, and transaction timestamps.
  • Date: 2025-10-09T00:21:24Z
  • Network: telegram
  • Published URL: (https://t.me/n2LP_wVf79c2YzM0/1873)
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: USA
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Ransomware attacks (including those by INC RANSOM, Qilin, CHAOS, akira, Radiant Group, PLAY, The Gentlemen, and Space Bears) remain prominent, targeting sectors like Energy & Utilities, Manufacturing, Education, Civil Engineering, and Transportation & Logistics across multiple countries. Data breaches and sales are widespread, affecting various industries from E-commerce and Financial Services to Government Administration and Healthcare & Pharmaceuticals, with leaked data ranging from massive customer databases to credit card records and highly sensitive passports/ID cards. Initial access sales are also notable, offering administrative or server access to organizations globally. The presence of Defacement activity, primarily targeting sites in Israel and Lebanon, along with claims of selling malware like a Brute & Checker tool, further underscores the persistent and varied threats faced by organizations worldwide. The data reveals a busy 24-hour period with a high volume of malicious activity across multiple threat categories and geographies.