This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged leak of Python Mailing Script for Russian State Messenger “Max”
- Category: Malware
- Content: The threat actor claims to have developed a Python-based mailing script for the Russian state messenger “Max”. According to their claim, the script features a GUI interface, support for file attachments, and requires a valid user token to operate.
- Date: 2025-09-09T14:34:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-messenger-Max-mailing-script)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ba7ca808-5038-4dc9-9e86-53b91458a1f2.png
- Threat Actors: Romeo666
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Student Loan Fund Unit Student services and welfare Student Development Division Phetchaburi Rajabhat University
- Category: Data Breach
- Content: The group claims to have leaked SQL data from the Student Loan Fund Unit, Student Services and Welfare, and the Student Development Division of Phetchaburi Rajabhat University.
- Date: 2025-09-09T14:30:50Z
- Network: telegram
- Published URL: (https://t.me/bl4ckcyb3rofficial/1873)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1dca2a80-099f-4397-b88f-90148be46a61.png
- Threat Actors: BL4CK CYB3R
- Victim Country: Thailand
- Victim Industry: Financial Services
- Victim Organization: student loan fund unit student services and welfare student development division phetchaburi rajabhat university
- Victim Site: pbruloan.pbru.ac.th
- Alleged data sale of Argentina National Business Project Portal
- Category: Data Breach
- Content: The threat actor claims to be selling a database of the Argentina National Business Project Portal. The compromised data reportedly includes 620,000 entries which contains full names, company names, email addresses, usernames, hashed passwords (hashID, clave), phone numbers, website URLs, project details, submission timestamps, membership levels, committee affiliations, activity status, and full address information including categories and subcategories.
- Date: 2025-09-09T14:22:49Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-620k-Argentina-National-Business-Project-Portal-Database-with-Passwords–32722)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/869aaf8a-36ae-475b-8c21-c0edeefbf5c5.png
- Threat Actors: dumpster
- Victim Country: Argentina
- Victim Industry: Government & Public Sector
- Victim Organization: argentina national business project portal
- Victim Site: argentina.gob.ar
- Alleged sale of admin access and data from Pakistan Police
- Category: Initial Access
- Content: The threat actor claims to have gained admin access to the Police Website of Pakistan, offering both admin access and data for sale. The leaked data reportedly includes sensitive law enforcement information such as region, district, police station, complaint records, person and officer names, contact numbers, complaint category, offense details, creation and follow-up dates, complaint status, FIR information, remarks, and response times.
- Date: 2025-09-09T14:15:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Admin-Access-to-Police-Website-of-Pakistan)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7a384485-e533-400b-98dc-10cd1a3168b2.png
- Threat Actors: BIGBROTHER
- Victim Country: Pakistan
- Victim Industry: Law Enforcement
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of an unidentified South Korea user database
- Category: Data Breach
- Content: The threat actor claims to be selling an unidentified South Korea user database, containing approximately 840,000 records. The leaked data reportedly includes Jumin numbers (Resident Registration Numbers), full names, email addresses, phone numbers, home and office addresses, job details, user IDs, passwords, nicknames, registration and last login dates, and other account metadata.
- Date: 2025-09-09T14:13:42Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-240k-South-Korea-User-Database-with-Jumin-RRN-Numbers)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0182b03d-8122-4a95-bab0-75170414c90a.png
- Threat Actors: dumpster
- Victim Country: South Korea
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of an unidentified South Korea e-commerce site
- Category: Data Breach
- Content: The threat actor claims to be selling 4.2 million records from an unidentified South Korea e-commerce platform. The data reportedly includes personally identifiable information (PII), full names, email addresses, phone numbers, bank account details, tax information, order and delivery details, payment and cash transaction data, shipping addresses, account activity, and other transactional metadata.
- Date: 2025-09-09T14:13:23Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-430k-South-Korea-E-commerce-Database-with-PII-Bank-Account-and-Tax-Information)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1b7099f0-2f73-4963-b1b7-c759e209da2f.png
- Threat Actors: dumpster
- Victim Country: South Korea
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of an unidentified Singapore based e-commerce site
- Category: Data Breach
- Content: The threat actor claims to be selling 720,000 customer profiles of an unidentified Singapore-based e-commerce platform. The data reportedly includes personally identifiable information (PII) such as full names, email addresses, phone numbers, home and shipping addresses, order history, product details, quantities, prices, discounts, payment methods, and order statuses.
- Date: 2025-09-09T14:09:20Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-720k-Singapore-E-commerce-Database-with-Full-PII-Addresses-Order-History)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3217c7a4-7703-4789-b694-8838e30045da.png
- Threat Actors: dumpster
- Victim Country: Singapore
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of an unidentified Saudi Arabia recruitment database
- Category: Data Breach
- Content: The threat actor claims to be selling an unidentified Saudi Arabia recruitment database, containing approximately 150,000 entries. The exposed data reportedly includes full names, dates of birth, gender, passport numbers, nationality, contact information (phone numbers, emails, addresses), CV file paths, desired positions, work experience (local, Gulf, international), education, skills, health and physical information, marital status, emergency contacts, and reference details.
- Date: 2025-09-09T14:04:29Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-150k-Saudi-Arabia-Recruitment-Database-with-Passport-Numbers-CV-Paths)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/22317c32-c0c9-47c5-b28d-ac6f2440943b.png
- Threat Actors: dumpster
- Victim Country: Saudi Arabia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Mexico National Professional Registry
- Category: Data Breach
- Content: The threat actor claims to be selling 450,000 professional records from Mexico, including full PII, RFC, CURP, Cédula, and salary details. The data reportedly contains names, emails, addresses, phone numbers, professional positions, company affiliations, academic qualifications, certifications, and other personal and professional information.
- Date: 2025-09-09T13:36:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-450k-mexico-National-Professional-Registry-Full-PII-RFC-CURP-C%C3%A9dula-Salary)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0caced30-52be-4eed-b3d8-d3147df44f37.png
- Threat Actors: dumpster
- Victim Country: Mexico
- Victim Industry: Professional Services
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Netherlands Rental Search Profiles
- Category: Data Breach
- Content: The threat actor claims to be selling 1.4 million rental search profiles from the Netherlands, including PII and income details. The data reportedly contains account IDs, full names, addresses, phone numbers, emails, dates of birth, student status, salary information, rental profile IDs, IBANs, and other personal details.
- Date: 2025-09-09T13:31:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-150k-netherlands-Rental-Search-Profiles-with-Full-PII-and-Income-Data-and-IBAN)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bec6d7cb-1920-408e-9d73-bf3036950f72.png
- Threat Actors: dumpster
- Victim Country: Netherlands
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged database sale of Mywallet Company Limited
- Category: Data Breach
- Content: The group claims to be selling a database from Mywallet Company Limited, exposing data on over 15 million users. The compromised information reportedly includes first and last names, tier status, email addresses, gender, dates of birth, country, and loyalty account details.
- Date: 2025-09-09T13:22:19Z
- Network: telegram
- Published URL: (https://t.me/h3c4kedzofficial/70)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5b8a5b9d-cd50-4653-ad78-c30f69ef89cb.png
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Information Technology (IT) Services
- Victim Organization: mywallet company limited
- Victim Site: mywallet.co
- Alleged data sale of Korus Group
- Category: Data Breach
- Content: The threat actor claims to be selling a database from Korus Group, containing over 15 million entries with full personal information. The leaked data reportedly includes full names, dates of birth, addresses, cities, postal codes, gender, email addresses, and phone numbers. Sample entries show detailed records for individuals, including titles, locations, and contact information.
- Date: 2025-09-09T13:18:07Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-K0LRUS-GROUP-ETAT-CIVIL-FR-DATA-15M)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/999073d2-2b32-4ef4-b0eb-5d366362c639.png
- Threat Actors: FRENCHBOUYGUES
- Victim Country: France
- Victim Industry: Design
- Victim Organization: korus group
- Victim Site: korusgroup.com
- Alleged data leak of Dubai Electricity & Water Authority (DEWA)
- Category: Data Breach
- Content: The threat actor claims to be selling Dubai Electricity & Water Authority (DEWA), exposing a dataset of 620,083 records. The leaked data reportedly includes customer information from DEWA’s systems.
- Date: 2025-09-09T13:14:33Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-dewa-gov-ae-Dubai-Electricity-Water-Authority-DEWA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c645a473-af80-49ca-aad2-a4678f06d1a2.png
- Threat Actors: NanC
- Victim Country: UAE
- Victim Industry: Energy & Utilities
- Victim Organization: dubai electricity & water authority (dewa)
- Victim Site: dewa.gov.ae
- Alleged unauthorized access to the internal system of the state of Antigua and Barbuda
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the internal system of the state of Antigua and Barbuda related to the management and operation of customs and taxes.
- Date: 2025-09-09T13:12:33Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1456)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/30a3734f-7349-44bb-8a31-146873bbe357.png, https://d34iuop8pidsy8.cloudfront.net/c6b003c1-56ed-47b8-870a-0606bfa91ab5.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Antigua and Barbuda
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of technical manual for Russia’s KH-47M2 Kinzhal hypersonic missile
- Category: Data Breach
- Content: The threat actor claims to be selling a technical manual for Russia’s KH-47M2 Kinzhal hypersonic missile system. The data includes the details operational procedures, integration with aircraft platforms, pre-/post-launch protocols, and safety/maintenance guidelines.
- Date: 2025-09-09T12:50:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-HIGHLY-CONFIDENTIAL-RUSSIAN-MISSILE-KH-47M2-KINZHAL-SYSTEM-OPERATION-DOCUMENT)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3f2112f1-5928-45a4-8f38-e1624cacb1ca.png
- Threat Actors: HorizonMonitor
- Victim Country: Russia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of an unidentified Korean hotel
- Category: Data Breach
- Content: The threat actor claims to be selling a database of an Unidentified Korean based hotel containing approximately 920,000 entries. The exposed data allegedly includes guest names, phone numbers, email addresses, passport numbers, gender, reservation details, check-in/check-out dates, room preferences, pricing, company information, and special requests.
- Date: 2025-09-09T12:45:44Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-620k-Korea-Hotel-Reservation-Database-w-Passport-Numbers)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a440495e-bcfa-4423-beec-095e9fb648a7.png
- Threat Actors: dumpster
- Victim Country: Unknown
- Victim Industry: Hospitality & Tourism
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RD Web access to an unidentified organization in USA
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized RD web access to an unidentified organization in USA.
- Date: 2025-09-09T12:37:10Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/265849/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/13644ab0-d2fe-4dc5-96b0-4e58e22acbfc.png
- Threat Actors: gadji
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorised access to AIR MILES
- Category: Initial Access
- Content: The threat actor claims to have unauthorized access to AIR MILES.
- Date: 2025-09-09T12:08:20Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/265843/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3f650120-6ec8-47cf-a343-c911119f2660.png
- Threat Actors: Baiden
- Victim Country: Canada
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: air miles loyalty inc.
- Victim Site: airmiles.ca
- Alleged unauthorized access to the national complaint system of the Latvian government.
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the national complaint systems of the Latvian government.
- Date: 2025-09-09T12:08:13Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1452)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/becb8390-13db-4885-988c-b9dea48fe645.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Latvia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to an advanced monitoring system in Latvia
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an advanced monitoring system on servers in Latvia.
- Date: 2025-09-09T12:03:31Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1446)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0654a926-bb30-4900-bb4c-a27a4b852a24.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Latvia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to Corruption Prevention and Combating Bureau (KNAB)
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the systems of Corruption Prevention and Combating Bureau (KNAB). NB: The authenticity of the post is not verified.
- Date: 2025-09-09T10:58:32Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1445)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/270ac802-0176-4cb9-849e-27e167cdc7a6.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Latvia
- Victim Industry: Government Administration
- Victim Organization: corruption prevention and combating bureau
- Victim Site: knab.gov.lv
- Alleged unauthorized access to Siemens SINUMERIK system in France
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to a Siemens SINUMERIK industrial controller in France. The compromised system allegedly allows full control over machine movements, tool parameters, program execution, and diagnostics, potentially enabling optimization or disruption of production processes.
- Date: 2025-09-09T10:42:13Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/723)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1a1ec2da-f48a-46db-87bd-a77f27902abb.png, https://d34iuop8pidsy8.cloudfront.net/e2f68999-83cd-418e-bae8-7c0490e6b0d7.png, https://d34iuop8pidsy8.cloudfront.net/d34c4f1f-4db3-433e-afcf-9c536184d85f.png, https://d34iuop8pidsy8.cloudfront.net/4226b36e-05ae-4803-bc05-b298ba28d976.png
- Threat Actors: Z-ALLIANCE
- Victim Country: France
- Victim Industry: Industrial Automation
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of 100k worldwide international credit Card
- Category: Data Breach
- Content: The threat actor claims to be selling 100k worldwide international credit card data. The data including name, phone number, headers, etc.
- Date: 2025-09-09T10:40:41Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-100k-WORLD-WIDE-CC-DATA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/480dc341-22f3-4864-a50e-8048c704c322.png
- Threat Actors: clara283
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Australian Magento-Based E-commerce Data
- Category: Data Breach
- Content: The threat actor claims to be selling data from an Australian e-commerce shop operating on Magento 2.3. The dataset contains 9,031 orders recorded between 01 August 2025 and 01 September 2025, including 1,850 credit card transactions. The actor also claims to provide phpMyAdmin access, along with payment details from credit card, PayPal, and bank transfers.
- Date: 2025-09-09T10:28:52Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/265846/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/407b4fff-9d9a-4e3e-af12-744160024f59.png
- Threat Actors: charley88
- Victim Country: Australia
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of USA checking accounts
- Category: Data Breach
- Content: The threat actor claims to be selling a USA checking account database, allegedly containing data for 250,000 accounts. The leaked dataset reportedly includes sensitive personal and financial information such as first and last names, addresses, city, state, ZIP code, email addresses, dates of birth, Social Security Numbers (SSNs), driving license numbers and states, phone and cell numbers, requested amounts, bank names, IBAN numbers, bank account countries, income types, occupations, net monthly income, employers, account types, account numbers, and routing numbers.
- Date: 2025-09-09T10:15:12Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-100k-WORLD-WIDE-CC-DATA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d153ba80-8677-4f47-ab61-7e5b4b3ca67b.png
- Threat Actors: clara283
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to air conditioners management system in Latvia
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an air conditioners management system inside a hotel in Latvia.
- Date: 2025-09-09T09:51:06Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1441)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a3e57c33-8ac4-4608-b675-d3d30a2ddaa4.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Latvia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- BD Anonymous claims to target Investment Board Nepal
- Category: Alert
- Content: A recent post by the group indicates that it is targeting the Investment Board of Nepal.
- Date: 2025-09-09T09:26:55Z
- Network: telegram
- Published URL: (https://t.me/httpstmesG9Uef8mbyoxYWVk/374)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1cac01b1-2d43-4cae-a36e-609b18cf1b06.png
- Threat Actors: BD Anonymous
- Victim Country: Nepal
- Victim Industry: Government Administration
- Victim Organization: investment board nepal
- Victim Site: ibn.gov.np
- BD Anonymous claims to target Nepal
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Nepal.
- Date: 2025-09-09T09:22:46Z
- Network: telegram
- Published URL: (https://t.me/httpstmesG9Uef8mbyoxYWVk/372)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9d0bd256-addc-4c9c-9784-fb9a0fab2160.png
- Threat Actors: BD Anonymous
- Victim Country: Nepal
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- GenZRisingNepal targets the website of Inland Revenue Department
- Category: Defacement
- Content: The group claims to have deface the website of Inland Revenue Department.
- Date: 2025-09-09T09:17:51Z
- Network: telegram
- Published URL: (https://t.me/ctrl_nepal/72)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ee4c4147-f858-43cc-93d1-5acf9fc8ac18.png, https://d34iuop8pidsy8.cloudfront.net/e00e459e-bac8-4edc-bd3a-162805c29e4c.png
- Threat Actors: GenZRisingNepal
- Victim Country: Nepal
- Victim Industry: Government Administration
- Victim Organization: inland revenue department
- Victim Site: ird.gov.np
- Alleged data leak of MK Brokers
- Category: Data Breach
- Content: The threat actor claims to have leaked 7 GB of sensitive data from MK Brokers. The data reportedly includes approximately 150,000 files, though the specific nature of the files (e.g., financial records, client data, contracts) remains unspecified.
- Date: 2025-09-09T09:03:26Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-7GB-MK-Brokers-Bank-Bulgaria)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5eb29842-8d0b-49aa-a302-0ed26aab2165.png
- Threat Actors: CLOBELSECTEAM
- Victim Country: Bulgaria
- Victim Industry: Financial Services
- Victim Organization: mk brokers
- Victim Site: mkb.bg
- Alleged leak of Japanese passport data
- Category: Data Breach
- Content: The threat actor claims to have leaked over 4.6TB of Japanese passport data, allegedly containing login access to the official site.
- Date: 2025-09-09T08:41:22Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/939)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/acc86a2f-1808-49c8-be0e-eda32c98a16c.png
- Threat Actors: DigitalGhost
- Victim Country: Japan
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Mamaket Inc.
- Category: Data Breach
- Content: The threat actor claims to be selling data of Mamaket Inc. The data includes phone numbers, email addresses, hashed passwords, transaction passwords, avatar URLs, gender, country, verification timestamps, GPS coordinates, and full address details (street, city, zip code).
- Date: 2025-09-09T08:36:08Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-All-user-data-and-phone-numbers-email-addresses-and-hashed-passwords-and-transactio)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b3610419-b0d0-43b2-af0f-7718ec493503.png, https://d34iuop8pidsy8.cloudfront.net/6642df9c-afc3-4bc1-9924-7a9ded4c803d.png
- Threat Actors: ZeroLatency_CVE
- Victim Country: USA
- Victim Industry: E-commerce & Online Stores
- Victim Organization: mamaket inc.
- Victim Site: mamaket.com
- Alleged leak of credit card details from France.
- Category: Data Breach
- Content: The group claims to have leaked credit card details from France, allegedly including the CCN, expiration date, CVV, bank, level, type, country, email, address, state/city, ZIP code, date of birth, and phone number.
- Date: 2025-09-09T08:19:51Z
- Network: telegram
- Published URL: (https://t.me/Bingo_channel42/45)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e3f5ffa4-ebf7-4f86-a7b9-66c60c098eba.png, https://d34iuop8pidsy8.cloudfront.net/91c10bfb-ba63-4470-ab28-bcc0ddeb2502.png
- Threat Actors: BINGO
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged database leak of Pelaku Ekonomi (go.id), Indonesia
- Category: Data Breach
- Content: The threat actor claims to have leaked a database allegedly linked to Pelaku Ekonomi (go.id) in Indonesia. The exposed dataset reportedly contains citizen identification numbers (NIK), names, full addresses, business fields, business addresses, and phone numbers, with more than 650 records disclosed.
- Date: 2025-09-09T07:51:22Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATA-PELAKU-EKONOMI-GO-ID)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/86b8fffb-63f7-4e6e-8d89-87157626bc47.png
- Threat Actors: darknessX404
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to OMNTEC tank monitoring systems in the United States
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to OMNTEC advanced tank monitoring and leak detection systems across the United States. The compromised systems allegedly had their sensors disabled, network settings altered, remote passwords changed, logs cleared, and printer settings modified, potentially disrupting monitoring of gas and diesel storage tanks. The actors also claim to have dumped some of the station settings.
- Date: 2025-09-09T07:27:11Z
- Network: telegram
- Published URL: (https://t.me/UNIT_1948/62)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0ddc0ebc-2e30-45db-a712-f93ad59d045d.png, https://d34iuop8pidsy8.cloudfront.net/12bc0ad9-db84-45a5-92b8-8eb4d379b0c9.png
- Threat Actors: UNIT 1948
- Victim Country: USA
- Victim Industry: Industrial Automation
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Department of Public Works and Spatial Planning in Lebak Regency
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from the official portal of the Department of Public Works and Spatial Planning in Lebak Regency, Indonesia. The exposed file contains detailed infrastructure data such as road segment IDs, names, condition status, length, surface types (hotmix, beton, lapen), and timestamps, with over 100 entries.
- Date: 2025-09-09T07:13:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-dpupr-lebakkab-go-id-Leak-Indonesian)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/020794b3-768d-4f0d-8461-cd67441d4256.png
- Threat Actors: movase
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: department of public works and spatial planning in lebak regency
- Victim Site: dpupr.lebakkab.go.id
- UNDERGROUND-NET targets the multiple websites of India
- Category: Defacement
- Content: The group claims to have defaced the multiple websites of India.
- Date: 2025-09-09T06:09:49Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1209)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/def8ad2c-93b1-4a89-9fe5-0d3c0b7725d9.png, https://d34iuop8pidsy8.cloudfront.net/e00e459e-bac8-4edc-bd3a-162805c29e4c.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- UNDERGROUND-NET targets the multiple websites of India
- Category: Defacement
- Content: The group claims to have defaced the multiple websites of India.
- Date: 2025-09-09T06:06:24Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1208)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8ab0924d-bd31-4a90-8731-b8644bf3a428.png, https://d34iuop8pidsy8.cloudfront.net/0e007f68-b2c6-4c74-8114-619a41682206.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of PROG Holdings, Inc.
- Category: Data Breach
- Content: The group claims to have leaked 18 TB data of PROG Holdings, Inc. The compromised data includes sensitive banking details, Social Security Numbers (SSNs), birthdates, emails, names, addresses, and bank routing information.
- Date: 2025-09-09T06:03:19Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/934)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7b2d67bf-db8b-41a5-81bc-640ff33dcd11.png, https://d34iuop8pidsy8.cloudfront.net/c62a9a12-6f44-470a-aa9c-e8b3b4f0df0d.png
- Threat Actors: DigitalGhost
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: prog holdings, inc.
- Victim Site: progholdings.com
- Alleged leak of login access to Public Procurement Monitoring Office, Government of Nepal
- Category: Initial Access
- Content: The group claims to have leaked login credential belonging to Public Procurement Monitoring Office, Government of Nepal
- Date: 2025-09-09T05:48:19Z
- Network: telegram
- Published URL: (https://t.me/ctrl_nepal/65)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f318e60b-ac11-4bcf-85c8-ab6cafb0bfae.png
- Threat Actors: GenZRisingNepal
- Victim Country: Nepal
- Victim Industry: Government Administration
- Victim Organization: public procurement monitoring office, government of nepal
- Victim Site: bolpatra.gov.np
- Alleged data breach of Ministry of Education and Technical Education
- Category: Data Breach
- Content: The threat actor claims to be leaking the database of 5,922 students from Egypt’s technical education system, exposing sensitive personal information. The compromised data reportedly includes full names and national ID numbers of students.
- Date: 2025-09-09T05:11:57Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-%F0%9F%9A%A8-Leak-of-5922-students-in-EGY-technical-education-names-national-IDs-%F0%9F%87%AA%F0%9F%87%AC)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2df395be-8b74-4318-a544-ec355302e553.png
- Threat Actors: joshuax
- Victim Country: Egypt
- Victim Industry: Government Administration
- Victim Organization: ministry of education and technical education
- Victim Site: moe.gov.eg
- UNDERGROUND-NET targets the website of Protades Indonesia
- Category: Defacement
- Content: The group claims to have defaced the website of Protades Indonesia.
- Date: 2025-09-09T03:13:31Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1207)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b8bcbf21-91e4-45c0-8f28-5ae50254f20b.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: Indonesia
- Victim Industry: Information Technology (IT) Services
- Victim Organization: protades indonesia
- Victim Site: protadesindonesia.web.id
- Alleged data breach of aiqfome
- Category: Data Breach
- Content: The threat actor claims to be selling the database of AIQFOME (aiqfome.com), a leading food delivery platform in Brazil. The exposed dataset reportedly contains over 7.2 million user records, including full names, CPF numbers (Brazilian SSNs), phone numbers, email addresses, physical addresses, order history, session IDs, timestamps, geolocation details, and internal tokens. The data, spanning from 2022 to 2024.
- Date: 2025-09-09T03:02:22Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-AIQFOME-DATABASE-7M-CPFs-Emails-Phones-Orders-BRAZIL-2025)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/35a2dee6-f09b-4b9a-927c-db7fdb4db95e.png
- Threat Actors: privilege
- Victim Country: Brazil
- Victim Industry: Information Technology (IT) Services
- Victim Organization: aiqfome
- Victim Site: aiqfome.com
- UNDERGROUND-NET targets the website of Alpargatas Palanec
- Category: Defacement
- Content: The group claims to have defaced the website of Alpargatas Palanec Proof: https://haxor.id/archive/mirror/233247
- Date: 2025-09-09T02:51:33Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1204)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c40c7578-5767-4c92-8daf-5c9357c1f49f.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: Argentina
- Victim Industry: Fashion & Apparel
- Victim Organization: alpargatas palanec
- Victim Site: alpargataspalanec.com.ar
- AL-MUJAHIDEEN FORCE 313 claims to target India
- Category: Alert
- Content: A recent post by the group indicates that they are targeting India Government.
- Date: 2025-09-09T02:37:01Z
- Network: telegram
- Published URL: (https://t.me/c/3019913760/76)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d3e1cd9c-2e40-475e-abdf-e3f9ac029897.png
- Threat Actors: AL-MUJAHIDEEN FORCE 313
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- UNDERGROUND-NET targets the website of BUDONGO WOMEN
- Category: Defacement
- Content: The group claims to have defaced the website of BUDONGO WOMEN,uganda
- Date: 2025-09-09T02:33:46Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1203)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eb50c49d-518d-41b0-b161-3dbc4e0caba0.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: Uganda
- Victim Industry: Business and Economic Development
- Victim Organization: budongo women
- Victim Site: budongowomen.com
- Alleged data breach of EMB-IIS
- Category: Data Breach
- Content: The threat actor claims to have breached the Integrated Information System (iis.emb.gov.ph) of the Philippine Environmental Management Bureau (EMB), a government agency under the Department of Environment and Natural Resources (DENR). The actor alleges they accessed unsecured APIs and scraped over 4.8 million records containing company, client, and personnel data, including full names, usernames, contact details, emails, tokens, client IDs, and project information. The data has been leaked in JSON format.
- Date: 2025-09-09T02:31:47Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Integrated-Information-system-IIS-EMB-GOV-PH)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cc15107b-dc88-4411-be7c-4b91a077dd76.png, https://d34iuop8pidsy8.cloudfront.net/7443c899-c0ff-42d7-a8e4-447f9eb4b33a.png
- Threat Actors: DNH
- Victim Country: Philippines
- Victim Industry: Environmental Services
- Victim Organization: emb-iis
- Victim Site: iis.emb.gov.ph
- UNDERGROUND-NET targets the website of HealthCare Cult
- Category: Defacement
- Content: The group claims to have defaced the website of HealthCare Cult Proof: https://haxor.id/archive/mirror/233244
- Date: 2025-09-09T01:08:23Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1201)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6ab3c6a7-e7aa-418b-9d89-2094136feffe.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: Unknown
- Victim Industry: Health & Fitness
- Victim Organization: healthcare cult
- Victim Site: healthcarecult.com
- UNDERGROUND-NET targets the website of Global GPS
- Category: Defacement
- Content: The group claims to have defaced the website of Global GPS,Egypt.
- Date: 2025-09-09T01:03:23Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1202)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0b59aa14-7abe-45f4-9aef-2eda2c5a7529.png
- Threat Actors: UNDERGROUND-NET
- Victim Country: Egypt
- Victim Industry: Building and construction
- Victim Organization: global gps
- Victim Site: global-gps-egy.com
- Tunisian Maskers Cyber Force claims to target Israel
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Israel.
- Date: 2025-09-09T00:56:20Z
- Network: telegram
- Published URL: (https://t.me/CyberforceTn/394)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5f126a3b-1424-40b9-9b6a-6a83036f2704.png, https://d34iuop8pidsy8.cloudfront.net/4cb48a41-9ed9-441a-9637-aff5e802ad21.png
- Threat Actors: Tunisian Maskers Cyber Force
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of Ministry of Culture in Morroco
- Category: Data Breach
- Content: threat actor claims to have obtained the Moroccan Ministry of Culture data, allegedly exposing internal government documents, with samples.
- Date: 2025-09-09T00:52:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-Documents-Morroco-Ministry-of-Culture-Internal-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ecb6c018-4291-4652-b411-dd8bd89bfae5.png, https://d34iuop8pidsy8.cloudfront.net/5f459952-0e6d-4991-afc0-3c655cfbed58.png, https://d34iuop8pidsy8.cloudfront.net/14334d01-9f91-43e8-9626-6ba9757f4496.png
- Threat Actors: NetworkBrokers
- Victim Country: Morocco
- Victim Industry: Government Administration
- Victim Organization: ministry of culture
- Victim Site: culture.ma
- Alleged Data Leak of Iranian Nuclear Archive
- Category: Data Breach
- Content: threat actor claims to have obtained the leaked 10TB of hacked Iranian military and nuclear data, containing weapons systems, nuclear and drone controls, defense information, and personal data of military personnel.
- Date: 2025-09-09T00:34:36Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/925)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c3997c4c-b8ba-450b-a5a0-c2b04d0dbf4c.png, https://d34iuop8pidsy8.cloudfront.net/aec19d4a-06c3-45de-8d4c-b98cf8468455.png
- Threat Actors: DigitalGhost
- Victim Country: Iran
- Victim Industry: Defense & Space
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Israel customer data
- Category: Data Breach
- Content: A threat actor claims to have leaked an Israeli database, containing sensitive information such as financial data, customer records, strategic documents, employee details, login access credentials, and company data. Among the exposed information is customer identity data, including full names and national ID numbers.
- Date: 2025-09-09T00:00:57Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/926)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dea58eab-71cb-426d-81e2-591ff58c928b.png, https://d34iuop8pidsy8.cloudfront.net/8ccd30d4-c75e-481b-bba5-c2f572c1ebef.png
- Threat Actors: DigitalGhost
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
The cyber incidents outlined in this report reveal a varied and active threat landscape. Data breaches and leaks are widespread, impacting a range of sectors including education, gaming, healthcare, and finance, and affecting countries like Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data is diverse, ranging from personal information, credit card details, and sensitive patient records to military components and extensive customer databases.
In addition to data compromise, there’s significant activity in the sale of initial access. Threat actors are selling unauthorized access to banking systems, corporate networks (including RDWeb access to firms in Canada and the UK), and even government and military infrastructure, such as the Royal Thai Air Force and an irrigation system in Madrid. The availability of offensive tools, like penetration testing and DDoS tools, further highlights the capabilities present in the cyber underground.
These events collectively show that organizations across different industries and regions are facing constant threats from data exfiltration, unauthorized network access, and the spread of malicious tools. The nature of these attacks underscores the critical need for strong cybersecurity measures, including robust access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against both sophisticated and opportunistic attacks.