[September-2-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Alleged data breach of Yemen Mobile

  1. Alleged data leak of Tropical Tours Shuttles

  1. Alleged data leak of Saint Pedro Poveda College

  1. Alleged sale of U.S. documents

  1. Alleged leak of Migrants resident ID cards

  1. Alleged Data Leak of MyChoice

  1. Alleged access sale to Embassy of India, Manila

  1. Alleged access sale to Embassy of India, Beirut

  1. Alleged access sale to Bihar Prohibition and Excise Department

  1. Alleged access sale to Odisha Police, Government of Odisha

  1. Alleged unauthorized access to Hermes product storage management system in Ukraine
  • Category: Initial Access
  • Content: The group claims to have gained full administrator access to the Hermes product storage management system, developed by MAS SYSTEMS and used for Ukrainian seed potato storage. The compromised system allegedly allows complete control over key industrial parameters, including temperature, ventilation, refrigeration units, humidity, drying, and cooling cycles. This unauthorized access reportedly enables disruption of storage processes, manipulation of microclimate conditions, and potential spoilage of stored products.
  • Date: 2025-09-02T12:05:52Z
  • Network: telegram
  • Published URL: https://t.me/Z_ALLIANCE/692
  • Screenshots:
  • Threat Actors: Z-ALLIANCE
  • Victim Country: Ukraine
  • Victim Industry: Industrial Automation
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged data leak of Israeli Air Force pilots

  1. Alleged Data Leak from an Unidentified Indian University
  • Category: Data Breach
  • Content: The threat actor has allegedly leaked a database of an unidentified University in India. The exposed dataset contains personally identifiable information (PII) of applicants applying for assistant professor roles across various disciplines. The leak includes full names, mobile numbers, email addresses, qualifications, experience, gender, religion, marital status, and detailed messages submitted with the applications.
  • Date: 2025-09-02T11:05:00Z
  • Network: openweb
  • Published URL: https://darkforums.st/Thread-DATABASE-Database-Career-University-Indian
  • Screenshots:
  • Threat Actors: G4ll
  • Victim Country: India
  • Victim Industry: Education
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged data leak of Fresno Filmworks
  • Category: Data Breach
  • Content: The threat actor claims to have leaked a user database belonging to Fresno Filmworks, which includes user credentials (user_login, user_pass), personal information (first_name, last_name, user_email), registration details, display names, biographical info, and various admin-level WordPress settings such as roles, screen layouts, and menu preferences.
  • Date: 2025-09-02T11:04:53Z
  • Network: openweb
  • Published URL: https://darkforums.st/Thread-DATABASE-USA-FRESNO-FILMWORKS
  • Screenshots:
  • Threat Actors: MrAxSiKucingHitam
  • Victim Country: USA
  • Victim Industry: Motion Pictures & Film
  • Victim Organization: fresno filmworks
  • Victim Site: fresnofilmworks.org

  1. Alleged leak of login access to Hanoi University of Business and Technology

  1. Alleged data leak of PG Soft user accounts

  1. Alleged data breach of German Experts
  • Category: Data Breach
  • Content: The group claims to have leaked data from German Experts. The compromised data allegedly includes the website database, application administration panel, and employee information.
  • Date: 2025-09-02T07:37:01Z
  • Network: telegram
  • Published URL: https://t.me/fattah_iriii/948
  • Screenshots:
  • Threat Actors: Cyber Fattah Team
  • Victim Country: UAE
  • Victim Industry: Automotive
  • Victim Organization: german experts
  • Victim Site: germanexperts.ae

  1. Alleged unauthorized access to unidentified national telecommunications control system in Paraguay
  • Category: Initial Access
  • Content: The group claims to have gained unauthorized access to an unidentified critical system in Paraguay that manages the operation and maintenance of national telecommunications networks. The compromised system allegedly supports major communication operators by controlling data flow, resource allocation, and high-speed internet services across both mobile and fixed networks. It reportedly includes modules for performance testing, real-time service quality monitoring, and automated failure logging with alerts to on-site operational teams. Additionally, the attackers claim the system contains tools for network traffic analysis, bandwidth management, and specialized BERT modules for measuring transmission errors in fiber optic and cable infrastructure.
  • Date: 2025-09-02T07:29:13Z
  • Network: telegram
  • Published URL: https://t.me/n2LP_wVf79c2YzM0/1304
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: Paraguay
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Cyber Fattah team claims to target multiple countries

  1. Alleged Data Leak Access to Hanoi University of Public Health

  1. Alleged Data Leak of Facebook

  1. Alleged Data breach of USTH Vietnam France University

  1. Alleged data breach of Jollibee
  • Category: Data Breach
  • Content: The threat actor claims to have leaked the database of 50,000 members in Jollibee . The exposed dataset includes detailed records such as include ID ,first name , last name , mail , mobile number , passwords , role id , email verified at ,remember token , created at , updated at , store reports and operational reports.
  • Date: 2025-09-02T05:34:51Z
  • Network: telegram
  • Published URL: https://t.me/sctt3rd/639
  • Screenshots:
  • Threat Actors: Scattered Lapsus$
  • Victim Country: Philippines
  • Victim Industry: Restaurants
  • Victim Organization: jollibee
  • Victim Site: jollibeefoods.com

  1. Alleged data breach of Jollibee Database

  1. Alleged sale of Payroll admin access to an unidentified organization

  1. Alleged data breach of Experian

  1. CyberVolk Group claims to target Japan

  1. Alleged data breach of AT&T

  1. Alleged data breach of Chatbooks

  1. Alleged data breach of Sindhi College

  1. Alleged data breach of Philippine Amusement and Gaming Corporation

  1. Alleged data breach of Homechef

  1. Alleged data leak of Ministry of Justice Court documents

  1. Alleged data leak of Ministry of justice

  1. Alleged data breach of Sandia

  1. Alleged data breach of Google / salesforce data

  1. Alleged data leak of Multiple organization

  1. Alleged Data Breach of Jollibee Foods Corporation
  • Category: Data Breach
  • Content: Threat actor claims to have obtained the Jollibee database containing over 50,000 user records, including names, emails, phone numbers, password hashes, roles, and account details, exposing employees and partners across multiple domains and creating serious risks of credential theft and phishing.
  • Date: 2025-09-02T01:51:07Z
  • Network: telegram
  • Published URL: https://t.me/c/2976044031/1259
  • Screenshots:
  • Threat Actors: Scattered Lapsus$
  • Victim Country: Philippines
  • Victim Industry: Food & Beverages
  • Victim Organization: jollibee foods corporation
  • Victim Site: jollibeefoods.com

  1. Alleged data breach of Burger King Brazil

  1. Alleged leak of multiple personal and organizational databases
  • Category: Data Breach
  • Content: The threat actor claims to be selling a leak Datagarden which contains around 1,400 records in Excel/CSV format. The dataset is described as including personal and organizational information such as emails, names, LinkedIn profiles, job positions, industries, company names, URLs, company sizes, locations, registration numbers, and phone numbers.
  • Date: 2025-09-02T01:34:02Z
  • Network: openweb
  • Published URL: https://bhf.pro/threads/712553/
  • Screenshots:
  • Threat Actors: TacnoJe
  • Victim Country: Unknown
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

  1. Alleged sale of unauthorized access to Phantom Wallet

  1. Fatimion cyber team targets the website of Islamic Movements

  1. Alleged sale of VIP RAT V7.6
  • Category: Malware
  • Content: The threat actor is offering to sell a malware tool called VIP RAT V7.6, which provides full remote access capabilities. Features include file manipulation, webcam and microphone spying, keylogging, password theft, GPS tracking, and botnet functionality for DDoS or crypto mining. The tool also allows full control over the victim’s device, including installing additional software and displaying custom messages.
  • Date: 2025-09-02T00:05:42Z
  • Network: telegram
  • Published URL: https://t.me/Hyder_N3x/70
  • Screenshots:
  • Threat Actors: Hider_Nex
  • Victim Country: Unknown
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education, gaming, healthcare, and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases. Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.