A threat actor has purportedly leaked extensive data pertaining to around 2.5 million New Zealand citizens, sourced from MediaWorks (mediaworks.co.nz). Initially intending to sell the information for $30,000, the actor encountered a lack of interest due to the hefty price tag. Consequently, they have opted to make the data freely available, opening the floodgates for potential misuse.…
Author: DailyDarkWeb
A threat actor claiming to offer network and mail access to an Indian Software Company. This company, known for its web hosting services, has become a target for malicious actors aiming to exploit sensitive data. With revenue totaling $462 million, the company’s network and client websites represent valuable assets vulnerable to exploitation.…
A threat actor has emerged, claiming to offer unauthorized access to the WordPress admin of an American shopping website. The actor revealed that an average of 75 orders were placed per day on the website over the past year. It’s stated that all accesses are acquired from exchange installations, with the actor disavowing any responsibility for potential neighboring accesses.…
In a concerning development, a threat actor has emerged, claiming to offer unauthorized access to the database of a leading American financial company. With an annual revenue reaching a staggering $5 billion, the company’s database likely contains a wealth of sensitive financial information. The threat actor has set the price for this illicit access at $5000, suggesting the severity of the security breach and the potential ramifications for both the company and its clientele.…
According to allegations, a series of DDoS attacks orchestrated by UserSec and the Cyber Army of Russia have been revealed, aiming to disrupt the operations of multiple Luxembourg websites. Reportedly, prominent targets of these purported attacks include Luxembourg’s Lux-Airport, Ministry of Foreign Affairs, and Luxembourg Stock Exchange Platform.…
In a sweeping international law enforcement operation, Nemesis Market, a notorious darknet marketplace, was seized by authorities. The Frankfurt am Main Public Prosecutor’s Office, alongside the Federal Criminal Police Office, orchestrated the takedown, securing server infrastructure in Germany and Lithuania. Cryptocurrencies totaling 94,000 euros were confiscated during the operation.…
A threat actor is purportedly a significant selling in the realm of Managed Service Providers (MSPs), as a vast encompassing more than 3,300 computers across over 40 American companies. The offering comprises two panels from a single MSP. The first panel boasts 1,581 computers, while the second panel hosts 1,784 computers, presenting a combined total of unparalleled scale and potential attack.…
A team of seasoned bug hunter move that highlights the perceived inadequacy of bug bounty programs, s has announced their decision to sell exclusive, exploitable vulnerabilities directly to interested parties.. Renowned for their expertise and credited by industry giants like Apple and Microsoft, this team asserts that traditional bug bounty systems fall short in adequately compensating their efforts.…
A threat actor going by the name verifiedBpp has purportedly put up for sale a significant amount of data allegedly sourced from the Saudi Ministry of Health. The dataset, spanning from 2020 to 2024, comprises 100 GB of information, including sensitive personal details such as full names, addresses, telephone numbers, blood types, patient records, staff internal messages, and emails.…
Allegations have emerged suggesting that NoName057(16) orchestrated a string of DDoS attacks aimed at disrupting several Polish websites. According to NoName057(16), these cyber assaults were launched in solidarity with Polish farmers who have expressed discontent with the pro-Ukrainian stances adopted by governmental authorities. Notable targets of these purported attacks include the Polish Autobahn A2 Autostrada Wielkopolska, the Gdańsk Transport Company, the authorization portal for the Polish autobahn A4, mPay: Płatności mobilne, public services of Poland, and the General Directorate of National Roads and Motorways of Poland.…
A purported leak of the Moscow Clinical Research Center’s database, attributed to a threat actor, has raised concerns over data privacy and security. The MKNC, officially known as MKNC named after A.S. Loginova, stands as a prominent multidisciplinary institution within the Moscow Department of Health, tracing its origins back to its formation in 2013 from the Central Research Institute of Gastroenterology.…
The LulzSec Muslims collective has recently directed its cyber warfare efforts towards Saudi ministries, executing a series of distributed denial-of-service (DDoS) attacks aimed at disrupting the functioning of their websites.
Among the institutions targeted are prominent entities such as the Ministry of Interior, Ministry of Education, and Ministry of Communications.…
Emerging reports indicate that a threat actor is actively peddling unauthorized access to a Canadian firm specializing in the design and manufacture of customized transportation equipment. Despite the company’s substantial annual revenue of $9.8 million, it appears to have fallen victim to this security breach. The access being offered by the threat actor grants custom domain admin privileges within the company’s network.…
A threat actor has reportedly put up for sale a database allegedly obtained from the Department of Medical Examination and Treatment Management under Vietnam’s Ministry of Health. According to the actor, the database contains approximately 257,000 user records, including fields such as ID, name, ID card details, phone numbers, dates of birth, addresses, and email addresses.…
LAPSUS$ ransomware FUD is now up for sale, offering a menacing array of features to potential buyers. Its capabilities include encrypting Disk C, disabling SecureBoot, UEFI, Windows Recovery, and Windows Bitlocker, alongside adding Startup programs, employing AntiTaskManager, blocking Access Path, and hiding the TaskBar. Additionally, an impending update will introduce functionalities such as Windows Defender Killer, Regedit Disable, and Antivirus Stopper.…
A threat actor known as IntelBroker has reportedly leaked the database of PYLC, a Mexican insurance company. The breach has affected approximately 63,000 users, compromising a vast array of records related to policies, quotes, premiums, fees, discounts, taxes, and more. The leaked data includes detailed information such as quote and policy numbers, user IDs for various roles, start and end dates of policies, as well as extensive metadata related to insurance categories, branches, statuses, and transactions.…
A threat actor is purportedly selling unauthorized Remote Desktop Protocol (RDP) access to a prominent American law firm. With an annual revenue estimated between $400 to $500 million, the law firm presents an enticing target for cybercriminals. The threat actor asserts access to critical servers, including a 32TB backup server with 11TB free, an accessible local intranet, a 17TB storage server, and hardware resources comprising 4011 host machines.…
Allegedly, CyberDragon, in collaboration with the Cyber Army of Russia, launched DDoS attacks targeting German defense firms supplying weapons to the Kiev regime. The affected companies include KNDS (KMW + Nexter Defense Systems), a prominent European defense company, and ESG Elektroniksystem- und Logistik-GmbH, a German entity specializing in electronic systems and logistics solutions for aerospace, defense, and other sectors.…
Jack 249, a notorious threat actor, has made a bold announcement regarding the successful infiltration of various entities within the Emirates. The targets of this cyber intrusion reportedly include Emirati companies, educational institutions, hospitals, websites, and platforms. The actor boasts possession of numerous databases harboring sensitive information belonging to citizens and employees.…
The Russian Evilics group has allegedly infiltrated a website belonging to the US Defense Logistics Agency, specifically targeting ASSIST.
ASSIST serves as a critical platform for standardization management activities within the Defense Standardization Program (DSP), facilitating the development, coordination, distribution, and management of defense and federal specifications and standards.…