Threat Actor: USDoD | USDoD Victim: CrowdStrike | CrowdStrike Price: Not specified Exfiltrated Data Type: Threat actor list and indicators of compromise (IOCs)

Key Points :

The hacktivist group USDoD claims to have breached CrowdStrike, a leading cybersecurity firm. They allege to have exfiltrated CrowdStrike’s entire threat actor list and accompanying indicators of compromise (IOCs).…
Read More

Threat Actor: Unknown | Unknown Victim: Red Art Games | Red Art Games Price: Not disclosed Exfiltrated Data Type: Personal customer information

Key Points :

Red Art Games announced a large-scale cyberattack compromising customer data. Order processing and returns are suspended during the investigation. The company’s website is currently closed and displays a notification about the attack.…
Read More

Threat Actor: Unidentified | Unidentified Victim: MSI | MSI Price: Not mentioned Exfiltrated Data Type: Customer information (real names, phone numbers, addresses)

Key Points :

MSI experienced a security breach similar to Zotac, where detailed customer information was leaked due to improper server permissions. Through MSI’s after-sales service site, anyone could download and export user data submitted since 2017, including real names, phone numbers, and addresses.…
Read More

Threat Actor: Unknown | Unknown Victim: ZOTAC Customers | ZOTAC Price: Not mentioned Exfiltrated Data Type: Customers’ names, phone numbers, email addresses, and shipping addresses

Key Points :

ZOTAC faced a security breach that exposed sensitive customer information. The compromised data includes customers’ personal details such as names, phone numbers, email addresses, and shipping addresses.…
Read More

Threat Actor: DoNex Ransomware | DoNex Ransomware Victim: Various victims | DoNex Ransomware victims Price: Free Exfiltrated Data Type: N/A

Key Points :

Avast researchers have discovered a critical flaw in the cryptographic schema of DoNex ransomware and its predecessors. The weakness lies in the encryption keys generation and use, allowing Avast to provide a decryptor to DoNex ransomware victims since March 2024.…
Read More

Threat Actor: Cybercriminals | Cybercriminals Victim: Singaporeans | Singaporeans Price: Varying prices based on source and quality of data Exfiltrated Data Type: Singpass credentials, biometric data, forged documents

Key Points :

Cybercriminals are selling stolen digital identities of Singaporeans on the Dark Web. The trade of sensitive personal information, including Singpass credentials, biometric data, and forged documents, has surged by 230% compared to the previous year.…
Read More

Threat Actor: OnePlus | OnePlus Victim: Users of OnePlus devices | OnePlus Price: Not specified Exfiltrated Data Type: User data, including IMEI and manufacturer details

Additional Information :

Security researcher Elliot Alderson discovered a file called “badword.txt” in the OnePlus clipboard application. The file contains a large number of Chinese phrases, suggesting that user data is being sent to Chinese servers without consent.…
Read More

Threat Actor: Cambridge Analytica | Cambridge Analytica Victim: Facebook | Facebook Price: N/A Exfiltrated Data Type: Facebook user data

Additional Information:

The Israeli Justice Ministry has launched an investigation into the leakage of Facebook user data to confirm if Israeli user information was stolen. The Israel Ministry’s Privacy Protection Authority has informed Facebook about the potential illegal “stealing” of personal information and other possible violations of Israel’s privacy laws.…
Read More

Threat Actor: Facebook, Google, and Microsoft | Facebook, Google, and Microsoft Victim: Norwegian Consumer Council | Norwegian Consumer Council Price: N/A Exfiltrated Data Type: Personal data

Additional Information :

The study found that Facebook, Google, and Microsoft have enabled privacy-intrusive settings by default. These companies use words that can be misunderstood, giving users an illusion of controlling personal data.…
Read More

Threat Actor: Hackers | hackers Victim: LastPass | LastPass Price: Not specified Exfiltrated Data Type: Software source code and proprietary technical documentation

Additional Information:

LastPass disclosed a security breach in which hackers gained access to portions of the LastPass development environment. The breach was initiated through a single compromised developer account and resulted in the theft of fragments of software source code and proprietary technical documentation.…
Read More

Threat Actor: Unknown | Unknown Victim: Hugging Face | Hugging Face Price: Not specified Exfiltrated Data Type: Spaces secrets

Additional Information:

The security breach affected Hugging Face’s Spaces platform. Unauthorized access to Spaces secrets was detected. A subset of Spaces’ secrets may have been compromised. Hugging Face revoked many HF tokens associated with the potentially accessed secrets.…
Read More