This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Deface peru claims to target Dirección Nacional de Inteligencia DINI
- Category: Alert
- Content: A recent post by the group alert claims that they are targeting Dirección Nacional de Inteligencia DINI
- Date: 2025-09-05T14:17:14Z
- Network: telegram
- Published URL: (https://t.me/DefacePeru/1550)
- Screenshots:
- Threat Actors: Deface Peru
- Victim Country: Peru
- Victim Industry: Government Relations
- Victim Organization: dirección nacional de inteligencia dini
- Victim Site: dini.gob.pe
- Alleged data sale of Canadian citizens
- Category: Data Breach
- Content: The threat actor claims to be selling identity information of 13 million Canadian citizens, including highly detailed personal and demographic data such as first and last names, street addresses, city, province, postal code, phone numbers, income, age, sex, home ownership, language, family status, education, job type, age of children, household size, dwelling age, and dwelling type.
- Date: 2025-09-05T13:30:15Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-CANADA-13million-Data)
- Screenshots:
- Threat Actors: badberake
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Crédit Mutuel
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing over 523,000 records from Crédit Mutuel. The alleged leak includes sensitive personal and financial information such as full names, addresses, dates of birth, bank account details, IBANs, and other banking information.
- Date: 2025-09-05T13:21:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-523K-FRANCE-DATABASE-CREDIT-MUTUEL-FULL-NAME-Address-DOB-Bank-infos-Iban)
- Screenshots:
- Threat Actors: Zodiac
- Victim Country: France
- Victim Industry: Financial Services
- Victim Organization: crédit mutuel
- Victim Site: creditmutuel.com
- Alleged data leak of Movistar Perú
- Category: Data Breach
- Content: The group claims to be selling 22 million records of customer data from Movistar. The compromise data reportedly includes DOC, DNI, customer information, service type, DCS, mobile numbers, plan details, and account status.
- Date: 2025-09-05T12:50:47Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1959)
- Screenshots:
- Threat Actors: Scattered Lapsus$
- Victim Country: Peru
- Victim Industry: Network & Telecommunications
- Victim Organization: movistar perú
- Victim Site: movistar.pe
- Alleged data leak of Balaroti
- Category: Data Breach
- Content: The threat actor claims to have leaked a 1.6 GB database from Balaroti. The leaked data allegedly includes customer records with personal information such as IDs, full names, birth dates, emails, addresses (including neighborhood, city, state, postal code, street type and number), primary and secondary phone numbers, gender, and customer type.
- Date: 2025-09-05T12:27:18Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Balaroti-database)
- Screenshots:
- Threat Actors: iwakura
- Victim Country: Brazil
- Victim Industry: Building and construction
- Victim Organization: balaroti
- Victim Site: balaroti.com.br
- Alleged data leak of CertEurope
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from CertEurope, allegedly containing an archive of tools and drivers for secure USB keys and smart cards, digital certificates linked to CertEurope and Certigreffe, electronic signature software such as SafeSign, PKI installation files, and legal documentation intended for lawyers and legal institutions.
- Date: 2025-09-05T12:20:08Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-leak-CertEurope-Data)
- Screenshots:
- Threat Actors: mecrobyte
- Victim Country: France
- Victim Industry: Information Technology (IT) Services
- Victim Organization: certeurope
- Victim Site: certeurope.fr
- Alleged data sale of AT&T Intellectual Property
- Category: Data Breach
- Content: The group claims to be selling 270 million records of data from AT&T Intellectual Property.
- Date: 2025-09-05T12:07:21Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1954)
- Screenshots:
- Threat Actors: Scattered Lapsus$
- Victim Country: USA
- Victim Industry: Network & Telecommunications
- Victim Organization: at&t intellectual property
- Victim Site: att.com
- Alleged data sale of AT&T
- Category: Data Breach
- Content: The group claims to be selling 270 million records of data from AT&T.
- Date: 2025-09-05T12:04:09Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1954)
- Screenshots:
- Threat Actors: Scattered Lapsus$
- Victim Country: USA
- Victim Industry: Network & Telecommunications
- Victim Organization: at&t
- Victim Site: att.com
- Alleged data leak of SMA Negeri 1 Ampana
- Category: Data Breach
- Content: The threat actor claims to have leaked the student user database of SMA Negeri 1 Ampana, allegedly exposing sensitive information of multiple users. The leaked dataset includes user IDs, default passwords, full student names, and user roles, potentially compromising the privacy and security of enrolled students.
- Date: 2025-09-05T11:52:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-SMAN1-AMPANA-BY-BELISARIUS)
- Screenshots:
- Threat Actors: BELISARIUS
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: sma negeri 1 ampana
- Victim Site: sman1ak.sch.id
- Alleged unauthorized access to NCC Alumni Association
- Category: Initial Access
- Content: Group claims to have leaked admin access of NCC Alumni Association
- Date: 2025-09-05T10:54:55Z
- Network: telegram
- Published URL: (https://t.me/YourAnonSRVN/1656)
- Screenshots:
- Threat Actors: Anonymous SRVN
- Victim Country: India
- Victim Industry: Government Administration
- Victim Organization: ncc alumni association
- Victim Site: nccauto.gov.in
- Alleged data leak of Sniitch
- Category: Data Breach
- Content: The threat actor claims to have leaked IP addresses of the users of Sniitch.
- Date: 2025-09-05T09:09:35Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-Sniitch-com)
- Screenshots:
- Threat Actors: krekti
- Victim Country: USA
- Victim Industry: E-commerce & Online Stores
- Victim Organization: sniitch
- Victim Site: sniitch.com
- TEAM BD CYBER NINJA OFFICIAL targets the website of INDILEARN
- Category: Defacement
- Content: The group claims to have deface the website of INDILEARN
- Date: 2025-09-05T08:58:51Z
- Network: telegram
- Published URL: (https://t.me/c/2594876836/154)
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA OFFICIAL
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: indilearn
- Victim Site: pmb.inbitef.ac.id
- TEAM BD CYBER NINJA OFFICIAL targets the website of Ministry of Tourism of the Republic of Indonesia
- Category: Defacement
- Content: The group claims to have deface the website of Ministry of Tourism of the Republic of Indonesia. Mirror link: https://ownzyou.com/zone/273220
- Date: 2025-09-05T08:53:51Z
- Network: telegram
- Published URL: (https://t.me/c/2594876836/155)
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA OFFICIAL
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: ministry of tourism of the republic of indonesia
- Victim Site: ppid.kemenparekraf.go.id
- Alleged data leak of Department of Budget and Management, Philippines
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of Department of Budget and Management, Philippines, national wealth records spanning 2015–2024, along with details on all departments and organizations.
- Date: 2025-09-05T07:21:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-mpc-edu-ph-Data-Breach-dbm-gov-ph)
- Screenshots:
- Threat Actors: AFish
- Victim Country: Philippines
- Victim Industry: Government Administration
- Victim Organization: department of budget and management, philippines
- Victim Site: dbm.gov.ph
- Alleged data leak of Marikina Polytechnic College
- Category: Data Breach
- Content: The threat actor claims to have leaked the Learning Management System (LMS) of Marikina Polytechnic College, exposing personal data of 500+ users, including full names, account types, birth dates, and email addresses.
- Date: 2025-09-05T07:20:54Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-mpc-edu-ph-Data-Breach-dbm-gov-ph)
- Screenshots:
- Threat Actors: AFish
- Victim Country: Philippines
- Victim Industry: Education
- Victim Organization: marikina polytechnic college
- Victim Site: mpc.edu.ph
- Alleged unauthorized access to Gobierno regional cusco
- Category: Initial Access
- Content: Group claims to have leaked admin access to Gobierno regional cusco.
- Date: 2025-09-05T07:06:55Z
- Network: telegram
- Published URL: (https://t.me/YourAnonSRVN/1655)
- Screenshots:
- Threat Actors: Anonymous SRVN
- Victim Country: Peru
- Victim Industry: Government & Public Sector
- Victim Organization: gobierno regional cusco
- Victim Site: geredutramitedigital.regioncusco.gob.pe
- Alleged unauthorized access to KACICE System in Poland
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to KACICE pool complexes in Poland. The access allegedly enables full administrative control, including monitoring and adjusting pH, redox, temperature, and oxygen levels, managing chemical dosing, pumps, and filtration modules, disabling purification functions, and altering or falsifying sensor data, with potential impact on water quality, safety, and system reliability.
- Date: 2025-09-05T07:00:53Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/710)
- Screenshots:
- Threat Actors: Z-ALLIANCE
- Victim Country: Poland
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Leak of Chinese Government Documents
- Category: Data Breach
- Content: Threat actor claims to have obtained and shared Chinese government documents related to Taiwan and fighter jet stealth technology, suggesting the material involves sensitive national security and military information.
- Date: 2025-09-05T06:13:09Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Chinese-government-documents-on-Taiwan-and-fighter-jet-stealth-technology)
- Screenshots:
- Threat Actors: CNagent
- Victim Country: China
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- AL-MUJAHIDEEN FORCE 313 claims to target Multiple countries
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Israel, India, Afghanistan, and the USA
- Date: 2025-09-05T06:03:32Z
- Network: telegram
- Published URL: (https://t.me/c/3019913760/39)
- Screenshots:
- Threat Actors: AL-MUJAHIDEEN FORCE 313
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged gain access to Ministry of Labor and Employment Promotion of Peru
- Category: Initial Access
- Content: The group claims to have gained access to labor certificate account of the Minister of the Interior, Carlos Malaver.
- Date: 2025-09-05T05:44:46Z
- Network: telegram
- Published URL: (https://t.me/DefacePeru/1545)
- Screenshots:
- Threat Actors: Deface Peru
- Victim Country: Peru
- Victim Industry: Government & Public Sector
- Victim Organization: ministry of labor and employment promotion of peru
- Victim Site: gob.pe/mtpe
- Alleged Data Leak of Pakistan Database
- Category: Data Breach
- Content: Threat actor claims to have obtained leaked database of 11 million Pakistani records containing sensitive personal details such as CNICs, names, contact information, addresses, and exam or job-related data.
- Date: 2025-09-05T05:32:42Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-11-MILLION-DATABASE-PAKISTAN-BY-BELISARIUS)
- Screenshots:
- Threat Actors: BELISARIUS
- Victim Country: Pakistan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of Prosys Ingeniería SpA
- Category: Data Breach
- Content: Threat actor claims to obtained the 19.3 GB data dump from prosys.cl containing around 657k names, 745k emails, and 487k phone numbers.
- Date: 2025-09-05T03:23:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Chile-700k-Name-Email-Phone-prosys-cl–31120)
- Screenshots:
- Threat Actors: AgSlowly
- Victim Country: Chile
- Victim Industry: Information Technology (IT) Services
- Victim Organization: prosys ingeniería spa
- Victim Site: prosys.cl
- Alleged data breach of NFT Arts 4U
- Category: Data Breach
- Content: Threat actor claims to have leaked the database of NFT Arts 4U.
- Date: 2025-09-05T03:05:49Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-nftarts4u-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: nft arts 4u
- Victim Site: nftarts4u.com
- Alleged data leak of High-Quality Forex recovery leads from multiple countries
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing over 37,000 high-quality Forex recovery leads, the data set reportedly includes personal and financial information such as first and last names, email addresses, country, phone numbers, deposit dates, deposit amounts, currency, second deposits, and associated brokers.
- Date: 2025-09-05T03:05:27Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/37k-forex-recovery-quality-leads.42334/)
- Screenshots:
- Threat Actors: USDT
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of Pahal Agri India Private Limited
- Category: Data Breach
- Content: The threat actor claims to be leaked database of Pahal Agri India Private Limited.
- Date: 2025-09-05T03:02:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-pahalagri-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: India
- Victim Industry: Paper & Forest Products
- Victim Organization: pahal agri india private limited
- Victim Site: pahalagri.com
- Alleged data leak of unidentified server in Japan
- Category: Data Breach
- Content: Threat actor claims to have leaked the data of unidentified server in Japan.
- Date: 2025-09-05T02:57:28Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Some-random-japanese-server)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Hikar Global
- Category: Data Breach
- Content: Threat actor claims to have leaked the database of Hikar Global.
- Date: 2025-09-05T02:54:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-hikartech-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: India
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: hikar global
- Victim Site: hikartech.com
- Alleged Data Breach of Get Yourself Optimized
- Category: Data Breach
- Content: The threat actor claims to be leaked database of Get Yourself Optimized
- Date: 2025-09-05T02:52:33Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-getyourselfoptimized-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: USA
- Victim Industry: Broadcast Media
- Victim Organization: get yourself optimized
- Victim Site: getyourselfoptimized.com
- Alleged Data Breach of Global Hospital
- Category: Data Breach
- Content: Threat actor claims to be leaked database of Global Hospital.
- Date: 2025-09-05T02:48:02Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-globalhospital-co)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: India
- Victim Industry: Hospital & Health Care
- Victim Organization: global hospital
- Victim Site: globalhospital.co
- Alleged sale of MMORPG Game Source Code
- Category: Data Breach
- Content: A threat actor is allegedly offering for sale the full source code of an MMORPG game. The package reportedly includes core systems for real-time multiplayer functionality, including character creation, combat (PvE/PvP), inventory management, quest progression, and in-game trading. It features a server/client architecture with database integration for persistent accounts, characters, and items.
- Date: 2025-09-05T02:44:51Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/265610/)
- Screenshots:
- Threat Actors: IncredAustin
- Victim Country: Unknown
- Victim Industry: Gaming
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of British Society of Clinical Hypnosis
- Category: Data Breach
- Content: The threat actor claims to have leaked sensitive data belonging to the British Society of Clinical Hypnosis (BSCH).
- Date: 2025-09-05T02:43:48Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-bsch-org-uk)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: UK
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: british society of clinical hypnosis
- Victim Site: bsch.org.uk
- Alleged Data Breach of BAPS Bal Mandal
- Category: Data Breach
- Content: Threat actor claims to have obtained the organizations data.
- Date: 2025-09-05T02:36:15Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-www-balmandal-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: India
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: baps bal mandal program
- Victim Site: balmandal.com
- Alleged data breach of Srashtasoft
- Category: Data Breach
- Content: The threat actor claims to be leaked database of Srashtasoft.
- Date: 2025-09-05T02:36:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-srashtasoft-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: srashtasoft
- Victim Site: srashtasoft.com
- Alleged data leak of Intelligence Directorate-National Police of Peru
- Category: Data Breach
- Content: Alleged data leak from the Intelligence Directorate of the National Police of Peru. The leaked data includes all DIRIN systems, including agents’ details, CIP numbers, positions, headquarters records, entries, exits, databases, and thousands of classified documents along with credentials, official letters, reports, circulars, and internal communications. NB : The authenticity of claim is yet to be verified.
- Date: 2025-09-05T00:59:23Z
- Network: telegram
- Published URL: (https://t.me/DefacePeru/1523)
- Screenshots:
- Threat Actors: Deface Peru
- Victim Country: Peru
- Victim Industry: Government Administration
- Victim Organization: intelligence directorate-national police of peru
- Victim Site: Unknown
- Intelligence Directorate-National Police of Peru
- Category: Data Breach
- Content: Alleged data leak from the Intelligence Directorate of the National Police of Peru. The leaked data includes all DIRIN systems, including agents’ details, CIP numbers, positions, headquarters records, entries, exits, databases, and thousands of classified documents along with credentials, official letters, reports, circulars, and internal communications.
- Date: 2025-09-05T00:48:20Z
- Network: telegram
- Published URL: (https://t.me/DefacePeru/1523)
- Screenshots:
- Threat Actors: Deface Peru
- Victim Country: Peru
- Victim Industry: Government Administration
- Victim Organization: intelligence directorate-national police of peru
- Victim Site: Unknown
A recent analysis of cyber incidents has highlighted a diverse and active landscape of threats. Data breaches and leaks are prominent, affecting various sectors from education, gaming, healthcare, and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases.
In addition to data compromise, the report also shows significant activity in initial access sales. Threat actors are offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further emphasizes the availability of offensive capabilities in the cyber underground.
These incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents underscores the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.