Threat Actor: CyberNiggers | CyberNiggers
Victim: MedicaMall | MedicaMall
Price: $500
Exfiltrated Data Type: Personal and transactional data

Key Points :

  • A threat actor claimed responsibility for a data breach involving over 70,000 customers.
  • Compromised data includes full names, phone numbers, addresses, email addresses, payment methods, and shipping/billing details.
  • The breach reportedly occurred on August 29, 2024.
  • MedicaMall is known for offering a wide range of medical products.

Threat Actor: grep | grep
Victim: Supreme Court of Philippines | Supreme Court of Philippines
Price: Not specified
Exfiltrated Data Type: 13,564 rows of court-related data

Key Points :

  • The breach allegedly impacted data belonging to applications, court cases, and other services.
  • Leaked data includes assessment numbers, full names, collection types, payments, and details of various court cases.
  • The threat actor included a sample of the leaked data in their post.

Threat Actor: SILKFIN AGENCY | SILKFIN AGENCY
Victim: DimeCuba | DimeCuba
Price: Not specified
Exfiltrated Data Type: SMS records, email records, transaction details

Key Points :

  • The breach reportedly compromised over 1 million SMS records and more than 100,000 email records.
  • Data includes private information from cardsims, admin and reseller records, and various user transaction details.
  • The breach occurred on August 26, 2024, and samples of the stolen data were released by the attackers.

Threat Actor: (unknown) | unknown
Victim: Federación Española de Balonmano | Federación Española de Balonmano
Price: Not specified
Exfiltrated Data Type: 70,000 records

Key Points :

  • The breach reportedly involves approximately 70,000 records containing valid DNI and mobile numbers.
  • Compromised data includes sensitive information such as DNI, full names, phone numbers, dates of birth, and addresses.
  • The accuracy of the claim remains unverified, and the situation is being monitored closely.

Threat Actor: (unknown) | unknown
Victim: Isuzu Motors International Operations (Thailand) | Isuzu Motors International Operations (Thailand)
Price: $500
Exfiltrated Data Type: Unauthorized VPN access

Key Points :

  • The threat actor claims to offer unauthorized access to the Palo Alto Networks VPN of Isuzu Motors.
  • Access includes full VPN entry into Isuzu’s network, potentially exposing sensitive corporate information.
  • The company operates in the architecture, engineering, and design industry in Thailand.

Threat Actor: (unknown) | unknown
Victim: Major French Advertising and Technology Company | Major French Advertising and Technology Company
Price: $1,500
Exfiltrated Data Type: Sensitive data and system access

Key Points :

  • The threat actor claims to have gained unauthorized access to the systems of a leading advertising and technology company in France.
  • Access includes customer servers, critical company details, internal communications, and sensitive customer data.
  • The hacker states they have control over the company’s chat system, allowing them to monitor confidential discussions.

Threat Actor: (unknown) | unknown
Victim: Major Israeli Health Fund | Major Israeli Health Fund
Price: 2 BTC
Exfiltrated Data Type: Personal data of 1.3 million customers

Key Points :

  • The breach allegedly obtained personal data of 1.3 million customers from a major health fund in Israel.
  • Compromised data includes full names, identity card numbers, dates of birth, addresses, phone numbers, and email addresses.
  • The threat actor is reportedly selling the entire dataset for 2 BTC, with payment to be made exclusively in Bitcoin.

Threat Actor: (unknown) | unknown
Victim: Spanish Athletics Federation | Spanish Athletics Federation
Price: Not specified
Exfiltrated Data Type: Sensitive personal information of approximately 140,000 individuals

Key Points :

  • The breach reportedly leaked a portion of the database containing sensitive personal information.
  • The compromised data includes DNI numbers, full names, phone numbers, dates of birth, and addresses.
  • The threat actor claimed that the data is fully formatted with no duplicates or invalid DNI numbers.

Threat Actor: (unknown) | unknown
Victim: Israeli Mobile Website | Israeli Mobile Website
Price: $2,000
Exfiltrated Data Type: Admin access

Key Points :

  • The threat actor is offering admin access to a mobile website in Israel, including full control over the site’s gift card system.
  • This access allows browsing the website’s backend, modifying user accounts, and changing site settings.
  • The seller is allegedly offering this high-level access for $2,000, with payment to be made in Bitcoin.


Daily Dark Web
https://dailydarkweb.net/
Your daily dose from the dark side and dark web
Thu, 29 Aug 2024 16:37:11 +0000
en-US

hourly


1


https://dailydarkweb.net/wp-content/uploads/2024/02/cropped-ddw-ico-32×32.png
Daily Dark Webhttps://dailydarkweb.net/
32
32


Threat Actor Offers Alleged Access to Large Israeli IT Companyhttps://dailydarkweb.net/threat-actor-offers-alleged-access-to-large-israeli-it-company/

Thu, 29 Aug 2024 17:00:03 +0000






https://dailydarkweb.net/?p=4527

In a dark web forum, a threat actor has published a post about selling alleged access to the cloud infrastructure of a large Israeli IT company. The post offers comprehensive access to the company’s virtual private network (VPN) and full Remote Desktop Protocol (RDP) access, along with 12 terabytes of data. The threat actor has […]

The post Threat Actor Offers Alleged Access to Large Israeli IT Company appeared first on Daily Dark Web.

]]>
In a dark web forum, a threat actor has published a post about selling alleged access to the cloud infrastructure of a large Israeli IT company. The post offers comprehensive access to the company’s virtual private network (VPN) and full Remote Desktop Protocol (RDP) access, along with 12 terabytes of data.

The threat actor has set the selling price at $150,000, with payment only accepted in Bitcoin. The post highlights that the transaction details and further communication will be conducted through encrypted messaging platforms, providing a Tox ID and a Telegram link for potential buyers.

The post Threat Actor Offers Alleged Access to Large Israeli IT Company appeared first on Daily Dark Web.

]]>



A Threat Actor Alleged Data Breach of Federación Española de Balonmanohttps://dailydarkweb.net/a-threat-actor-alleged-data-breach-of-federacion-espanola-de-balonmano/

Thu, 29 Aug 2024 16:00:46 +0000




https://dailydarkweb.net/?p=4521

A recent claim by a threat actor suggests that a database belonging to the Federación Española de Balonmano has been compromised. The alleged breach reportedly involves approximately 70,000 records, filtered from a larger set of 120,000 lines, ensuring all entries contain valid DNI (National Identification Numbers) and mobile numbers. The compromised data includes sensitive information […]

The post A Threat Actor Alleged Data Breach of Federación Española de Balonmano appeared first on Daily Dark Web.

]]>
A recent claim by a threat actor suggests that a database belonging to the Federación Española de Balonmano has been compromised. The alleged breach reportedly involves approximately 70,000 records, filtered from a larger set of 120,000 lines, ensuring all entries contain valid DNI (National Identification Numbers) and mobile numbers.

The compromised data includes sensitive information such as DNI, full names, phone numbers, dates of birth, and addresses. The database is said to be fully formatted, with no duplicates or invalid DNIs. The breach allegedly affects individuals within Spain.

The accuracy of this claim remains unverified, and the situation is being monitored closely. The potential impact on the affected individuals could be significant if the data is confirmed to have been compromised.

The post A Threat Actor Alleged Data Breach of Federación Española de Balonmano appeared first on Daily Dark Web.

]]>



MedicaMall Allegedly Breached by CyberNiggers, Customer Data Exposedhttps://dailydarkweb.net/medicamall-allegedly-breached-by-cyberniggers-customer-data-exposed/

Thu, 29 Aug 2024 12:00:43 +0000




https://dailydarkweb.net/?p=4516

A threat actor, identified as CyberNiggers, has allegedly claimed responsibility for a data breach involving the Egyptian medical supplies provider MedicaMall. The breach, reportedly occurring on August 29, 2024, is said to have compromised the personal and transactional data of over 70,000 customers. This includes sensitive information such as full names, phone numbers, addresses, email […]

The post MedicaMall Allegedly Breached by CyberNiggers, Customer Data Exposed appeared first on Daily Dark Web.

]]>
A threat actor, identified as CyberNiggers, has allegedly claimed responsibility for a data breach involving the Egyptian medical supplies provider MedicaMall. The breach, reportedly occurring on August 29, 2024, is said to have compromised the personal and transactional data of over 70,000 customers. This includes sensitive information such as full names, phone numbers, addresses, email addresses, payment methods, and shipping/billing details.

MedicaMall, known for offering a wide range of medical products such as surgical instruments and comprehensive medical equipment, now faces the potential fallout from this breach.

The post MedicaMall Allegedly Breached by CyberNiggers, Customer Data Exposed appeared first on Daily Dark Web.

]]>



Threat Actor Claims to Sell Unauthorized VPN Access to Isuzu Motors International Operations (Thailand)https://dailydarkweb.net/threat-actor-claims-to-sell-unauthorized-vpn-access-to-isuzu-motors-international-operations-thailand/

Wed, 28 Aug 2024 17:00:05 +0000









https://dailydarkweb.net/?p=4509

A threat actor has emerged, claiming to offer unauthorized access to the Palo Alto Networks VPN of Isuzu Motors International Operations (Thailand) Co., Ltd., a company with a reported revenue of $7.8 million. The hacker is selling this access for $500, raising significant security concerns for the company, which operates in the architecture, engineering, and […]

The post Threat Actor Claims to Sell Unauthorized VPN Access to Isuzu Motors International Operations (Thailand) appeared first on Daily Dark Web.

]]>
A threat actor has emerged, claiming to offer unauthorized access to the Palo Alto Networks VPN of Isuzu Motors International Operations (Thailand) Co., Ltd., a company with a reported revenue of $7.8 million. The hacker is selling this access for $500, raising significant security concerns for the company, which operates in the architecture, engineering, and design industry in Thailand.

According to the threat actor’s announcement, the access being sold includes full VPN entry into Isuzu Motors International Operations’ network, potentially exposing sensitive corporate information and internal systems. The company, headquartered in Thailand with 76 employees, is a critical part of Isuzu’s international operations. The alleged sale of such access poses a significant risk, not only to Isuzu but also to its partners and customers, highlighting the increasing threats faced by companies in today’s digital landscape.

The post Threat Actor Claims to Sell Unauthorized VPN Access to Isuzu Motors International Operations (Thailand) appeared first on Daily Dark Web.

]]>



Threat Actor Claims to Sell Access to Major French Advertising and Technology Companyhttps://dailydarkweb.net/threat-actor-claims-to-sell-access-to-major-french-advertising-and-technology-company/

Wed, 28 Aug 2024 15:57:07 +0000








https://dailydarkweb.net/?p=4506

A threat actor has surfaced, claiming to have gained unauthorized access to the systems of a leading advertising and technology company in France. The alleged breach includes a wide range of sensitive data and system access, which the hacker is offering for sale at $1,500, payable in Bitcoin. This breach reportedly provides access to customer […]

The post Threat Actor Claims to Sell Access to Major French Advertising and Technology Company appeared first on Daily Dark Web.

]]>
A threat actor has surfaced, claiming to have gained unauthorized access to the systems of a leading advertising and technology company in France. The alleged breach includes a wide range of sensitive data and system access, which the hacker is offering for sale at $1,500, payable in Bitcoin. This breach reportedly provides access to customer servers, critical company details, internal communications, and other key areas of the company’s digital infrastructure.

In the hacker’s announcement, they claim to have successfully infiltrated the company’s systems, allowing them to view and download all files stored on customer servers. These files are said to contain highly sensitive customer data, including financial records. Additionally, the hacker states they have access to the company’s internal and sensitive information, such as employee records, financial data, and more. They also claim to have control over the company’s chat system, giving them the ability to monitor and access all conversations, including those involving confidential discussions. The breach is described as extensive, also covering other parts of the company’s infrastructure, including their website and FTP server.

The post Threat Actor Claims to Sell Access to Major French Advertising and Technology Company appeared first on Daily Dark Web.

]]>



Major Israeli Health Fund Allegedly Breached 1.3 Million Records Exposedhttps://dailydarkweb.net/major-israeli-health-fund-allegedly-breached-1-3-million-records-exposed/

Wed, 28 Aug 2024 11:00:01 +0000









https://dailydarkweb.net/?p=4503

In a significant security breach, a threat actor has claimed to have obtained the personal data of 1.3 million customers from a major health fund in Israel. The alleged breach was announced on a dark web forum, where the perpetrator posted details of the stolen information and offered it for sale. According to the post, […]

The post Major Israeli Health Fund Allegedly Breached 1.3 Million Records Exposed appeared first on Daily Dark Web.

]]>
In a significant security breach, a threat actor has claimed to have obtained the personal data of 1.3 million customers from a major health fund in Israel. The alleged breach was announced on a dark web forum, where the perpetrator posted details of the stolen information and offered it for sale.

According to the post, the compromised data includes a wide array of sensitive personal information:

  • Full name
  • Identity card number
  • Date of birth
  • Address
  • Phone number
  • Number of children
  • Email address
  • City

The threat actor is reportedly selling the entire dataset for 2 BTC, with payment to be made exclusively in Bitcoin. Interested buyers are directed to contact the seller via a provided Telegram link.

The post Major Israeli Health Fund Allegedly Breached 1.3 Million Records Exposed appeared first on Daily Dark Web.

]]>



Spanish Athletics Federation Allegedly Breachedhttps://dailydarkweb.net/spanish-athletics-federation-allegedly-breached/

Wed, 28 Aug 2024 10:00:04 +0000







https://dailydarkweb.net/?p=4499

A threat actor has allegedly leaked a portion of the database belonging to the Federación Española de Atletismo (Spanish Athletics Federation) on a dark web forum. The compromised data reportedly includes sensitive personal information of approximately 140,000 individuals. According to the post the full database originally contained around 500,000 lines of information. However, the leaked […]

The post Spanish Athletics Federation Allegedly Breached appeared first on Daily Dark Web.

]]>
A threat actor has allegedly leaked a portion of the database belonging to the Federación Española de Atletismo (Spanish Athletics Federation) on a dark web forum. The compromised data reportedly includes sensitive personal information of approximately 140,000 individuals.

According to the post the full database originally contained around 500,000 lines of information. However, the leaked subset of the database was carefully filtered to include only entries with complete and valid data, specifically ensuring that each line contained a DNI (Spanish national identity number) and a phone number. The allegedly compromised data reportedly encompasses DNI numbers, full names, phone numbers, dates of birth, and addresses.

The threat actor claimed that the data is “FULL formatted” with no duplicates or invalid DNI numbers.

The post further included a Telegram handle, for interested parties to reach out, presumably to negotiate the sale or distribution of the data.

The post Spanish Athletics Federation Allegedly Breached appeared first on Daily Dark Web.

]]>



The Supreme Court of Philippines Allegedly Breached 13K Rows Publishedhttps://dailydarkweb.net/the-supreme-court-of-philippines-allegedly-breached-13k-rows-published/

Wed, 28 Aug 2024 08:00:42 +0000








https://dailydarkweb.net/?p=4493

According to the dark web forum post, the data breach impacted data belonging Applications, Court cases and Other services. The breach was allegedly carried out by a threat actor known as “grep”. According to the post published by the threat actor, the compromised database includes 13,564 rows of information. The leaked data encompasses the following: […]

The post The Supreme Court of Philippines Allegedly Breached 13K Rows Published appeared first on Daily Dark Web.

]]>
According to the dark web forum post, the data breach impacted data belonging Applications, Court cases and Other services. The breach was allegedly carried out by a threat actor known as “grep”.

According to the post published by the threat actor, the compromised database includes 13,564 rows of information. The leaked data encompasses the following:

  • Assessment numbers
  • Full names
  • Collection types
  • Payments
  • Details of various court cases (including types and categories)

The threat actor also included a sample data from the alleged leak.

The post The Supreme Court of Philippines Allegedly Breached 13K Rows Published appeared first on Daily Dark Web.

]]>



Alleged Sale of Admin Access to Israeli Mobile Websitehttps://dailydarkweb.net/alleged-sale-of-admin-access-to-israeli-mobile-website/

Tue, 27 Aug 2024 19:00:41 +0000

https://dailydarkweb.net/?p=4490

A threat actor is reportedly offering admin access to a mobile website in Israel, including full control over the site’s gift card system. According to the seller, this access allows a potential buyer to browse the website’s backend, view and modify user accounts, and even change site settings as desired. Additionally, the access includes the […]

The post Alleged Sale of Admin Access to Israeli Mobile Website appeared first on Daily Dark Web.

]]>
A threat actor is reportedly offering admin access to a mobile website in Israel, including full control over the site’s gift card system. According to the seller, this access allows a potential buyer to browse the website’s backend, view and modify user accounts, and even change site settings as desired. Additionally, the access includes the ability to manage the gift card system comprehensively—this means viewing, editing, and even canceling existing gift cards.

The seller is allegedly offering this high-level access for $2,000, with the payment to be made in Bitcoin (equivalent to 0.032 BTC).

The post Alleged Sale of Admin Access to Israeli Mobile Website appeared first on Daily Dark Web.

]]>



Threat Actor Claimed to Breach Database of DimeCubahttps://dailydarkweb.net/threat-actor-claimed-to-breach-database-of-dimecuba/

Tue, 27 Aug 2024 16:00:55 +0000




https://dailydarkweb.net/?p=4483

A data breach involving the Cuban-focused online platform, DimeCuba.com, has been claimed by the SILKFIN AGENCY. According to the threat actor, the breach occurred on August 26, 2024, and reportedly compromised a wide array of sensitive data, including over 1 million SMS records, more than 100,000 email records, and extensive transaction details. DimeCuba, widely used […]

The post Threat Actor Claimed to Breach Database of DimeCuba appeared first on Daily Dark Web.

]]>
A data breach involving the Cuban-focused online platform, DimeCuba.com, has been claimed by the SILKFIN AGENCY. According to the threat actor, the breach occurred on August 26, 2024, and reportedly compromised a wide array of sensitive data, including over 1 million SMS records, more than 100,000 email records, and extensive transaction details.

DimeCuba, widely used by Cubans living abroad, offers services such as mobile recharges, international calls, and remittances. The compromised data allegedly includes private information from cardsims, admin and reseller records, and various user transaction details. The attackers have also released samples of the stolen data to substantiate their claims.

fb_sms_history_sample:  ***
card_chatsim_sample: ****
app_validation_codes_sample: ****
admin_and_resellers_sample: ****
mails_sample: ****
chase_payments_sample: ***

This breach, if verified, could have severe implications for the privacy and security of DimeCuba’s users and highlights ongoing vulnerabilities in digital platforms handling sensitive personal data.

The post Threat Actor Claimed to Breach Database of DimeCuba appeared first on Daily Dark Web.

]]>