This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged data leak of McDonald’s and Partners
- Category: Data Breach
- Content: The threat actor claims to have leaked 220M records from McDonald’s and several other corporations. NB: The data leak reportedly originated from a partner organization and includes information beyond McDonald’s, involving multiple corporations.
- Date: 2025-09-26T14:16:31Z
- Network: openweb
- Published URL: (https://x.com/greppygreppy/status/1971106435632353283)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f86b2db3-3025-4155-979d-f044f8a4eefe.png
- Threat Actors: grep
- Victim Country: USA
- Victim Industry: Restaurants
- Victim Organization: mcdonald’s
- Victim Site: mcdonalds.com
- Alleged Database Leak of ITTell Ukraine
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of ITTell, a Ukrainian IT and telecommunications solutions provider, after allegedly breaching its systems. The data allegedly 2.00 GB in size and reportedly compromised on September 26, 2025. The leaked dataset contains sensitive personal information, including full names, phone numbers, addresses, and basic communication logs of the company’s customers and business contacts.
- Date: 2025-09-26T13:39:57Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-ITTell-Ukraine-Database-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2839a38f-bc13-4c3e-82d1-ba6e9052e376.jpg https://d34iuop8pidsy8.cloudfront.net/14ec99ca-66d6-46f0-82c7-a6ad7b80f80e.jpg
- Threat Actors: KaruHunters
- Victim Country: Ukraine
- Victim Industry: Network & Telecommunications
- Victim Organization: ittell
- Victim Site: itteil.com.ua
- Alleged data sale of Shellter Elite v11.1
- Category: Malware
- Content: The threat actor claims to be selling Shellter Elite v11.1, a malware tool.
- Date: 2025-09-26T13:31:06Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Shellter-Elite-v11-1-known-before-as-Shellter-Pro-Plus)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/462d5e7c-f0ac-4b26-8af8-0f5cf53f98c0.png
- Threat Actors: user40603
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to unidentified hosting providers in Europe
- Category: Initial Access
- Content: The group claims to have gained unauthorized admin panel access to an unidentified hosting providers in Europe.
- Date: 2025-09-26T13:09:18Z
- Network: telegram
- Published URL: (https://t.me/perunswaroga/558)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/628d86c4-a9c1-4b13-9059-a50ea5ed3070.JPG
- Threat Actors: Perun Svaroga
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Hyderabad Metro Rail Limited
- Category: Data Breach
- Content: The threat actor claims to be selling data from Hyderabad Metro Rail Limited, India. The compromised data include merchant ID, merchant short ID, encryption secret key, encryption IV key, QR encryption secret key, Paytm merchant key, Paytm callback URL, and more.
- Date: 2025-09-26T12:24:25Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Hyderabad-Metro)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ab4f6496-11f7-42c6-9982-b7c78da11ceb.png
- Threat Actors: meoow
- Victim Country: India
- Victim Industry: Transportation & Logistics
- Victim Organization: hmrl
- Victim Site: hmrl.co.in
- Alleged data breach of Tecnova Group Srl
- Category: Data Breach
- Content: The threat actor claims to have leaked sensitive data from Tecnova Group Srl.
- Date: 2025-09-26T11:56:15Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-Teknova-Group-Data-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/94db0494-d247-4c4b-9df3-ad3d9ac6d246.png https://d34iuop8pidsy8.cloudfront.net/33052f96-0deb-44f3-ba5e-6f9bcb09e9f4.png
- Threat Actors: KaruHunters
- Victim Country: Italy
- Victim Industry: Wholesale
- Victim Organization: tecnova group srl
- Victim Site: tecnovagroup.com
- Alleged unauthorized access to Munro Control System, USA
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to a Munro control system in the USA. The compromised system reportedly enables monitoring of liquid levels, pressure, flow rates, and pump status, as well as managing pumping operations and emergency detection.
- Date: 2025-09-26T11:41:40Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/789)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d8625bd8-3c08-498c-bee9-4f86f29a16c0.png https://d34iuop8pidsy8.cloudfront.net/28a058a3-ad66-421b-994a-c50339bb719c.png https://d34iuop8pidsy8.cloudfront.net/dd5d8317-9cc1-481d-8c9a-c3d16840d024.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: USA
- Victim Industry: Energy & Utilities
- Victim Organization: munro
- Victim Site: munropump.com
- Alleged unauthorized access to MEBLE WOŹNIAK
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to MEBLE WOŹNIAK in Poland. The compromised system allegedly allows control of heating and ventilation control panel.
- Date: 2025-09-26T10:56:32Z
- Network: telegram
- Published URL: (https://t.me/noname05716_eng_vers/242)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5feadc4d-7b7c-42a7-a0f2-c8a32e5a4bd7.JPG https://d34iuop8pidsy8.cloudfront.net/9c98923f-aaa0-4cb5-9236-85776f99f0a9.JPG
- Threat Actors: NoName057(16)
- Victim Country: Poland
- Victim Industry: Furniture
- Victim Organization: meble woźniak
- Victim Site: meblewozniak.com.pl
- Alleged data breach of The Changanacherry Co-operative Urban Bank Ltd.
- Category: Data Breach
- Content: The group claims to have gained database from The Changanacherry Co-operative Urban Bank Ltd. The data reportedly includes id, login type id, password, user name, name, create date, online status, enabled status, last visited ip, last visited date etc.
- Date: 2025-09-26T10:07:56Z
- Network: telegram
- Published URL: (https://t.me/babayoerorsystem1/205)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/56ce8d8c-1e4f-4a04-a448-2e01852c76e1.JPG
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: India
- Victim Industry: Banking & Mortgage
- Victim Organization: the changanacherry co-operative urban bank ltd.
- Victim Site: changanacherryurban.in
- Alleged data breach of National Planning Department (NPD), Sri Lanka
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from the National Planning Department (NPD) of Sri Lanka. The compromised data includes name, designation, mobile number, office line, email, and sector.
- Date: 2025-09-26T08:57:12Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Sri-Lanka-Department-of-National-Planning-Staff-Directory-leak)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f94e1ced-c11a-453e-8a03-fcb3b415a1e6.png
- Threat Actors: copper
- Victim Country: Sri Lanka
- Victim Industry: Government Administration
- Victim Organization: national planning department
- Victim Site: npd.treasury.gov.lk
- Alleged Sale of Corporate Accesses and Logs
- Category: Initial Access
- Content: The threat actor claims to be selling corporate access credentials, logs, and related services targeting entities primarily located in the US and EU. The available inventory includes diverse access types such as RDP/WEB/ SQL for various industries, including Insurance Services, Software, Government & Hardware Retail, and Construction.
- Date: 2025-09-26T08:55:19Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267033/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8a013983-6600-4ded-9b9f-5716830efd26.png
- Threat Actors: soler
- Victim Country: USA
- Victim Industry: Insurance
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Tentara Nasional Indonesia Personnel Records
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing 400,000 personnel records belonging to the TNI (Tentara Nasional Indonesia, or Indonesian National Armed Forces). The post shows a sample of the alleged data, which includes structured columns for identifiers, NIK (Indonesian national ID numbers), Names, Family Relationships, and Dates of Birth.
- Date: 2025-09-26T07:31:13Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-400-thousand-TNI-member-database-by-TERRORISM666)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6e71892d-c7e6-43aa-a5f9-285b74916db4.png
- Threat Actors: TERRORISM666
- Victim Country: Indonesia
- Victim Industry: Military Industry
- Victim Organization: tentara nasional indonesia
- Victim Site: tni.mil.id
- Alleged data breach of Brunei Postal Services Department
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 1.5 million logistics tracking records from the Postal Services Department of Brunei. The leaked data allegedly includes item IDs, mail IDs, addresses, postcodes,phone numbers and more.
- Date: 2025-09-26T06:57:33Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Brunei-Database-post-gov-bn-Track-Items-Information-1-5M)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2c4d4c5f-f980-410d-a093-01200877d6fb.png
- Threat Actors: RobotMan
- Victim Country: Brunei
- Victim Industry: Government Administration
- Victim Organization: brunei postal services department
- Victim Site: post.gov.bn
- Alleged data leak of stock investors lead in USA
- Category: Data Breach
- Content: Threat actor claims to have leaked data of stock investors lead in USA. The compromised data includes name, address, email, etc.
- Date: 2025-09-26T05:13:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-%F0%9D%9F%97%F0%9D%9F%96-%F0%9D%9F%93%F0%9D%90%8A-%F0%9D%90%94%F0%9D%90%92%F0%9D%90%80-%F0%9D%90%92%F0%9D%90%93%F0%9D%90%8E%F0%9D%90%82%F0%9D%90%8A-%F0%9D%90%88%F0%9D%90%8D%F0%9D%90%95%F0%9D%90%84%F0%9D%90%92%F0%9D%90%93%F0%9D%90%8E%F0%9D%90%91%F0%9D%90%92-%F0%9D%90%8B%F0%9D%90%84%F0%9D%90%80%F0%9D%90%83%F0%9D%90%92)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f9abdee3-c1b5-4695-95a6-81aab4d3ee0d.png
- Threat Actors: neelki
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of MetaMask Checker by CodeGangland
- Category: Malware
- Content: Threat actor is offering MetaMask Checker by CodeGangland a fast folder/ZIP-crawling wallet-sweeper that extracts wallet addresses and hashes, snapshots USD balance estimates, supports exportable CSV/JSON results and an optional password-check; classified as high-risk crypto-theft tooling (dual-use for authorized forensics but commonly abused for illicit wallet harvesting).
- Date: 2025-09-26T04:58:41Z
- Network: openweb
- Published URL: (https://demonforums.net/Thread-MetaMask-Checker-by-CodeGangland–177158)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/05e82f6b-f428-4ec5-b086-6afc81b4929c.png
- Threat Actors: Starip
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Land Transportation Office (LTO) – Philippines
- Category: Data Breach
- Content: The threat actor claims to have leaked sensitive data from the Land Transportation Office (LTO) of the Philippines. The exposed dataset reportedly include email addresses, login credentials, PIN codes, financial records, bank transactions, license and insurance data, and internal account details.
- Date: 2025-09-26T04:34:14Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Land-Transportation-Office-of-the-PHILIPPINES)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a447dd13-3a5a-41fb-875a-50e9bdaa934e.png
- Threat Actors: Quantum_Security_Group
- Victim Country: Philippines
- Victim Industry: Government & Public Sector
- Victim Organization: land transportation office (lto)
- Victim Site: lto.gov.ph
- Alleged sale of unauthorized access to unidentified Managed Services Provider in USA
- Category: Initial Access
- Content: Threat actor claims to have root access to a USA Managed Services Provider (Private Cloud Hosting & Network Engineering) with 35 years in business and 250+ active B2B clients; target device: Linux firewall.
- Date: 2025-09-26T04:14:46Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-USA-Managed-Services-Provider-Private-Cloud-Hosting-Network-Engineering)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bff2997e-f02e-4dbb-aa3f-86c1404d2e9e.png
- Threat Actors: miyako
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Hazard Nuker v1.3.3
- Category: Malware
- Content: Threat actor is offering Hazard Nuker v1.3.3 a command-line, assault-style toolkit that automates multi-vector account disruption (mass messaging, deletions, bans), credential/telemetry capture, and high-intensity abuse workflows; classified as malicious nuker/abuseware though occasionally repackaged for red-team testing.
- Date: 2025-09-26T04:07:39Z
- Network: openweb
- Published URL: (https://demonforums.net/Thread-Hazard-Nuker-v1-3-3)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b7a2f22b-5af1-428f-a841-a8c1022c186a.png
- Threat Actors: Starip
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Calzzapato
- Category: Data Breach
- Content: Threat actor claims to be selling data from Calzzapato. The data reportedly includes over 150,000 records containing customers’ full names, email addresses, phone numbers, physical addresses, and payment method details, indicating a significant breach of personal and financial information.
- Date: 2025-09-26T04:02:44Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Calzzpato-Order-Sales-150-000-LINES)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/faa30798-254a-4d80-9a50-68746ef3da91.png
- Threat Actors: icaro
- Victim Country: Mexico
- Victim Industry: Retail Industry
- Victim Organization: calzzapato
- Victim Site: calzzapato.com
- Alleged sale access to unidentified Worldwide FinTech
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to a worldwide FinTech company specializing in prepaid cards, POS systems, e-commerce gateways, digital banking, and mobile banking.
- Date: 2025-09-26T03:56:52Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Worldwide-FinTech-Global-Card-Payment-Solutions)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/07eb59a7-f3d3-47f7-9551-75e8dfdc4814.png
- Threat Actors: miyako
- Victim Country: Unknown
- Victim Industry: Financial Services
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale access to US Navy
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to a US Navy / USAF / USDoD engineering contractor.
- Date: 2025-09-26T03:43:38Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-US-Navy-USAF-USDoD-Engineering-Contractor)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8c672b8c-50a3-4a2d-a867-75294f5b2216.png
- Threat Actors: miyako
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized access to unidentified Insurance organization in Canada
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to unidentified Insurance organization in Canada.
- Date: 2025-09-26T03:39:05Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Canadian-Insurance-Credentialing-Agency)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/42a7700e-896e-432e-bb2b-446acaf26a58.png
- Threat Actors: miyako
- Victim Country: Canada
- Victim Industry: Insurance
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized access to unidentified medical equipment manufacturing organization in USA
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to unidentified medical equipment manufacturing organization in USA.
- Date: 2025-09-26T03:32:56Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-USA-Medical-Device-Manufacturing-Tracking)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e02f771f-27b8-48ec-ad02-0521bea09245.png
- Threat Actors: miyako
- Victim Country: USA
- Victim Industry: Medical Equipment Manufacturing
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Saxo Bank Germany
- Category: Data Breach
- Content: Alleged Data Leak of September Saxo Bank Germany Financial Investment and Wealth Management Records Involving 700,000 Online Trades NB : Authenticity of claim is yet to be verified
- Date: 2025-09-26T03:30:58Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7382)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/455a8fab-7e17-405a-8fe0-98f4e2caa017.png
- Threat Actors: Aiqianjin
- Victim Country: Germany
- Victim Industry: Banking & Mortgage
- Victim Organization: saxo bank
- Victim Site: Unknown
- Alleged sale of unauthorized access to Saudi Government Ministry
- Category: Initial Access
- Content: Threat actor claims to be selling root access to a firewall device belonging to a Saudi government ministry.
- Date: 2025-09-26T03:29:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Saudi-Government-Ministry)
- Screenshots: https://d35f66dc-d8fe-4693-8c36-0447715b4354.png
- Threat Actors: miyako
- Victim Country: Saudi Arabia
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of CIMB Bank
- Category: Data Breach
- Content: Alleged Data Leak of September Malaysia CIMB Financial Investments Covering All Fund Types and Bonds Worth 720,000 NB : Authenticity of claim is yet to be verified
- Date: 2025-09-26T03:25:42Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7384)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ebf740f3-6c7e-4f05-821d-2f3d83fa9022.png
- Threat Actors: Aiqianjin
- Victim Country: Malaysia
- Victim Industry: Banking & Mortgage
- Victim Organization: cimb bank
- Victim Site: cimb.com
- Alleged data leak of HSBC UK
- Category: Data Breach
- Content: Alleged Data Leak of September HSBC UK Senior Credit Card Records Worth 830,000 NB : Authenticity of claim is yet to be verified
- Date: 2025-09-26T03:25:27Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7383)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b495ce22-4e09-4a7a-95ec-245e8dd937e4.png
- Threat Actors: Aiqianjin
- Victim Country: UK
- Victim Industry: Banking & Mortgage
- Victim Organization: hsbc uk
- Victim Site: hsbc.co.uk
- Alleged data leak of Indonesian full names and Tax Identification Numbers
- Category: Data Breach
- Content: Threat actor claims to have leaked Indonesian full names and Tax Identification Numbers
- Date: 2025-09-26T03:24:40Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-FULL-NAME-AND-TIN-INDONESIA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6ec057ef-e3b3-4ffb-a9a6-7f733c5cc65e.png
- Threat Actors: FokafSquad
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of National Student Registration Numbers
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing national student registration numbers (NISN) and student registration numbers (NIS) for multiple students in a class. The data includes detailed personal identifiers such as names, class information, and unique registration numbers. This leak exposes sensitive student information.
- Date: 2025-09-26T03:09:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-data-national-student-registration-number-and-student-registration-number)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/433e93c1-c416-4879-9ac2-b117aa8f5e58.png https://d34iuop8pidsy8.cloudfront.net/2306ff3f-b1e8-455e-97c3-d2f2392e68ab.png
- Threat Actors: FokafSquad
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Leak of Sensitive Data From Indonesian Public Figure’s System
- Category: Initial Access
- Content: The group claims to have leaked confidential emails, personal photos, bank documents, and other sensitive files belonging to the Indonesian public figure.
- Date: 2025-09-26T03:03:41Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1744)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f1514e01-2196-42e8-9ce2-aa37589f2b0e.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of TexSender Pro v8.9.7
- Category: Malware
- Content: Threat actor is offering TexSender Pro, a tool for automated bulk Telegram messaging and group management, enabling large-scale outreach with multi-account support, message personalization, and ban mitigation features.
- Date: 2025-09-26T03:01:58Z
- Network: openweb
- Published URL: (https://demonforums.net/Thread-TexSender-Pro-v8-9-7-Keygen-Telegram-mass-invite-and-mass-DM)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9306ac5a-d0dc-4f1e-9ecc-862e1bba50ad.png
- Threat Actors: aviana
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified Home Improvement & Hardware Retail in USA and Germany
- Category: Initial Access
- Content: Threat actor claims to be selling RDWeb access to an unidentified Home Improvement & Hardware Retail in USA and Germany. The environment is protected by MalwareBytes, and the access level is User.
- Date: 2025-09-26T02:58:39Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/73a32474-6650-4235-bed3-12032218b4df.png
- Threat Actors: soler
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Android one-click RCE
- Category: Malware
- Content: Threat actor claims to be selling an Android one-click remote code execution (RCE) exploit.
- Date: 2025-09-26T02:52:27Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267021/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5793dc84-0105-424a-8652-e004f35419ac.png
- Threat Actors: Vanger
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified Building Materials company in USA
- Category: Initial Access
- Content: Threat actor claims to be selling RDWeb access to an unidentified Building Materials company in the United States. The environment is protected by Windows Defender, and the access level is User.
- Date: 2025-09-26T02:49:59Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d27306f7-0927-4678-9128-4daf8c192fd4.png
- Threat Actors: soler
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Fud word exploit
- Category: Malware
- Content: Threat actor claims to be selling a FUD exploit to bypass Microsoft SmartScreen
- Date: 2025-09-26T02:48:23Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267020/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0b5abd7e-e793-4193-b4fb-6a0830c4d8cf.png
- Threat Actors: node_js_dev
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified business services company in the USA
- Category: Initial Access
- Content: The threat actor claims to be selling RD Web access to an unidentified business services company in the USA. The environment is protected by Sentinel Agent, and the access level is User.
- Date: 2025-09-26T02:43:17Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/af09c455-91bc-4e0d-ac8b-615aeb68ab7f.png
- Threat Actors: soler
- Victim Country: USA
- Victim Industry: Business and Economic Development
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified Airlines in USA
- Category: Initial Access
- Content: Threat actor claims to be selling RDWeb access to an unidentified Airlines, Airports & Air Services company in the United States.The environment has no listed AV, and the access level is User.
- Date: 2025-09-26T02:37:41Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5ac5520d-1579-46cb-819b-4eac4a7cf57e.png
- Threat Actors: soler
- Victim Country: USA
- Victim Industry: Airlines & Aviation
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified Netherlands-based commercial and residential construction company
- Category: Initial Access
- Content: Threat actor claims to be selling RDWeb access to an unidentified Commercial & Residential Construction company in the Netherlands.The environment is protected by Datto, the access level is Local Admin.
- Date: 2025-09-26T02:29:04Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8725f7a9-1f84-4e9c-9377-fbf9ae74ca63.png
- Threat Actors: soler
- Victim Country: Netherlands
- Victim Industry: Building and construction
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb access to an unidentified Membership Organization in Belgium
- Category: Initial Access
- Content: Threat actor claims to be selling RDWeb access to an unidentified Membership Organizations and Medical Specialists Hospitals & Physicians company in Belgium.The environment is protected by WithSecure, and the access level is Local User.
- Date: 2025-09-26T02:19:10Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/267015/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/63999cf8-4f74-4a78-96e5-04b96265a473.png
- Threat Actors: soler
- Victim Country: Belgium
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of MedSkin Solutions Dr. Suwelack AG
- Category: Data Breach
- Content: Threat actor claims to have leaked data from MedSkin Solutions Dr. Suwelack AG. The compromised data includes around 83,000 documents, contain financial records such as budget planning, income, expenses, bank statements, tax reports, investment details, and marketing strategies.
- Date: 2025-09-26T00:50:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-DATA-MedSkin-Solutions-Dr-Suwelack-Co-Ltd-143-gb)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6511dae2-003b-40d4-beab-ebc0b94a437d.png https://d34iuop8pidsy8.cloudfront.net/99210985-d2b3-4d6f-8f83-d6a9dbf3cd1f.png https://d34iuop8pidsy8.cloudfront.net/cd418424-6894-4d76-ab3a-6ba65711f8da.png https://d34iuop8pidsy8.cloudfront.net/ac747e5f-4610-495f-8518-279325c11c4c.png https://d34iuop8pidsy8.cloudfront.net/70286fa1-a955-42f9-8808-3cd309575319.png https://d34iuop8pidsy8.cloudfront.net/7035b041-7c01-405a-bc2c-6df865a9af0e.png https://d34iuop8pidsy8.cloudfront.net/15d1b929-1ea3-4b11-9ba0-f6e017fb9116.png
- Threat Actors: Sorb
- Victim Country: Germany
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: medskin solutions dr. suwelack ag
- Victim Site: medskin-suwelack.com
- Alleged data breach of Swedish National Courts Administration (Domstolsverket)
- Category: Data Breach
- Content: The group claims to have obtained 500 GB of internal data from the Swedish National Courts Administration (SNCA). The exposed samples include Swedish court verdicts containing sensitive personal data
- Date: 2025-09-26T00:36:34Z
- Network: telegram
- Published URL: (https://t.me/c/2297393697/668)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e47bce51-8863-40f4-8860-c787fd59e61c.png
- Threat Actors: HIME666
- Victim Country: Sweden
- Victim Industry: Judiciary
- Victim Organization: swedish national courts administration (snca)
- Victim Site: domstol.se
- Alleged data breach of Sambas Regency
- Category: Data Breach
- Content: Threat actor claims to have leaked data from Sambas Regency. The compromised data includes full names, unique national identity numbers (NIKs), organizational roles such as delegation head, secretary, treasurer, coach, and official, along with gender information.
- Date: 2025-09-26T00:31:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-data-Sambas-Regency)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/abb725ba-044e-44d5-ad6d-82ca40cc9f62.png
- Threat Actors: FokafSquad
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: sambas regency
- Victim Site: sambas.go.id
- Alleged data leak of Indonesian civil servants
- Category: Data Breach
- Content: Threat actor claims to have leaked data of Indonesian civil servants.
- Date: 2025-09-26T00:21:29Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Personal-data-of-Indonesian-civil-servants)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1959c8a1-b0af-44eb-a549-171b980cfd17.png https://d34iuop8pidsy8.cloudfront.net/fdad217e-3470-4676-87d2-9b1ca507fea8.png
- Threat Actors: TomSec
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
Defacement Incidents
The following incidents relate to website defacements, strictly based on the provided data.
- V FOR VENDETTA CYBER TEAM targets the website of Ayapoa
- Category: Defacement
- Content: The group claims to have deface the website of Ayapoa.
- Date: 2025-09-26T14:41:59Z
- Network: telegram
- Published URL: (https://t.me/VFCTeam/168)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c3882506-01dc-4fbd-81c0-e66f6e573cc0.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Tanzania
- Victim Industry: Human Resources
- Victim Organization: ayapoa
- Victim Site: ayapoa.com
- V FOR VENDETTA CYBER TEAM targets the website of MACRO-IT
- Category: Defacement
- Content: The group claims to have defaced the website of MACRO-IT.
- Date: 2025-09-26T14:19:04Z
- Network: telegram
- Published URL: (https://t.me/VFCTeam/167)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b6cc511b-c6a5-43bb-ab67-9e468d73680b.JPG
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Zambia
- Victim Industry: Software Development
- Victim Organization: macro-it
- Victim Site: macroit.org
- V FOR VENDETTA CYBER TEAM targets the website of Paragon Career Solution
- Category: Defacement
- Content: The group claims to have defaced the website of Paragon Career Solution
- Date: 2025-09-26T14:16:52Z
- Network: telegram
- Published URL: (https://t.me/VFCTeam/166)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6627459f-de0d-4105-a565-abf9b230bc31.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: UK
- Victim Industry: Staffing/Recruiting
- Victim Organization: paragon career solution
- Victim Site: paragoncareersolution.com
- V FOR VENDETTA CYBER TEAM targets the website of Maqbool Solutions
- Category: Defacement
- Content: The group claims to have defaced the website of Maqbool Solutions.
- Date: 2025-09-26T13:55:36Z
- Network: telegram
- Published URL: (https://t.me/VFCTeam/165)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a35e0d2b-18a3-408f-bcb3-281d33ee6c95.JPG
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Pakistan
- Victim Industry: Information Technology (IT) Services
- Victim Organization: maqbool solutions
- Victim Site: maqboolsolutions.com
- V FOR VENDETTA CYBER TEAM targets mutliple websites in India
- Category: Defacement
- Content: The group claims to have defaced multiple websites in India.
- Date: 2025-09-26T12:43:30Z
- Network: telegram
- Published URL: (https://t.me/VFCTeam/164)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/266a1ef7-27b1-465f-adbc-bac1a361c180.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: India
- Victim Industry: Education
- Victim Organization: sri chaitanya school marathahalli-2
- Victim Site: srichaitanyaschoolmarathahalli2.net
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from restaurants and telecommunications to government and military industries, and impacting countries including the USA, Ukraine, Italy, India, Sri Lanka, Indonesia, Brunei, Philippines, Mexico, Canada, Germany, Sweden, Belgium, and the Netherlands. The compromised data ranges from personal user information, financial records, and login credentials to sensitive personnel records and logistical tracking data.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to control systems (Munro, MEBLE WOŹNIAK), corporate networks (RDWeb access to US, Canadian, Dutch, and Belgian firms), and government/military infrastructure (Saudi Government Ministry, US Navy/USAF/USDoD contractor).
The sale of malware, including a penetration testing tool (Shellter Elite v11.1), crypto-theft tooling (MetaMask Checker), a command-line assault toolkit (Hazard Nuker), bulk messaging tools (TexSender Pro), an Android RCE exploit, and FUD exploit sales, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.