Threat Actor: IntelBroker, Sanggiero, EnergyWeaponUser Victim: Five Eyes Intelligence Group, Acuity Inc

Information: 🌟 IntelBroker, Sanggiero, and EnergyWeaponUser leaked sensitive documents linked to the Five Eyes Intelligence Group. 🌟 The leaked data includes full names, emails, office and personal cell numbers, and email addresses associated with government, military, and Pentagon entities.…

Read More

Threat Actor: Unknown Victim: US Department of Education Information: 🌟 The threat actor allegedly breached the database of the US Department of Education. 🌟 The compromised data includes UserIDs and Phone Numbers. 🌟 The leaked data is reported to be 288 megabytes in size. 🌟 Approximately 8.9 million entries were exposed.…

Read More

Threat Actor: Unknown Victim: American 3D Model Downloading Website

Information: – The threat actor is offering unauthorized access to the Shell admin of an American 3D models downloader website. – The website has completed a total of 1,421,173 downloads for the year and 166,343 downloads specifically for the month of February.…

Read More

Threat Actor: Unknown Victim: French outsourcing service company

Information: 🌟 The threat actor is offering unauthorized access to the RDP (Remote Desktop Protocol) of a prominent French outsourcing service company. 🌟 The victim company has a revenue of $830 million. 🌟 This unauthorized access allows entry into Windows systems through a RDP, providing authorization of the domain system.…

Read More

Threat Actor: Unknown Victim: Numerous companies across various countries

Information: 🌟 The threat actor is offering unauthorized access to numerous companies. 🌟 The list includes companies from diverse sectors and countries. 🌟 The sectors range from hospitality, food & beverage, finance, agriculture, IT, membership organizations, federal, engineering, parking, environmental services, consumer electronics, business services, hospitals/healthcare, colleges & universities, and freight & logistics services.…

Read More

Threat Actor: Cybercriminals Victim: Individuals and businesses

Information: – There are 31 new variants of ransomware identified in March. – Ransomware encrypts valuable data on infected systems. – Cybercriminals demand exorbitant ransoms for decryption keys. – Ransomware poses a significant threat to individuals and businesses. – Detection and mitigation of ransomware are increasingly challenging.…

Read More

Threat Actor: CyberNiggers Group Victim: HSBC and Barclays Banks

Information: 🌟 The CyberNiggers group, allegedly orchestrated by members Sanggiero and IntelBroker, breached the security systems of HSBC and Barclays banks. 🌟 Extensive databases were compromised, including notary_request_2024.csv, ledger_summary_2024.csv, _transaction__2024.csv, and notification_2024.csv. 🌟 These databases contain crucial information about banking operations, such as transaction records, account details, and user notifications.…

Read More

🔍 Last Activity View: A forensic tool by NirSoft that provides a detailed logbook of system activities. It’s useful for spotting malicious activities executed by malware in the background. Simple language makes it accessible for users of all levels.

🔧 Kappa: An advanced, open-source tool by Mandiant for analyzing malware executables across Windows, Mac, and Linux.…

Read More

Link Sharing and News:Dark.Fail — This site is on both the Clearnet and Dark Web. Dark.Fail provides authentic links to various Darknet websites. This allows users to reach legitimate links, keeping scammers away from using phishing links.Dark.Fail Main Page — This is a partial screenshot of the main page

2. DarknetLive — Is on the Clearnet and Dark Web. This site is owned by the Incognito Darknet Market admin and provides news on vendor arrests and other illegal Dark web news.…

Read More

Threat Actor: Digital Revolt and the Cyber Dragon Victim: North Macedonia

Information: 🌟 The Digital Revolt and the Cyber Dragon groups are allegedly responsible for the cyber attacks. 🌟 The attacks involved Distributed Denial of Service (DDoS) tactics. 🌟 The attackers breached the defenses of key state websites, including those responsible for public procurement and the Sistema48 platform.…

Read More

____________________ Summary: A PhaaS campaign called “Darcula” has been targeting organizations in over 100 countries using more than 20,000 fake domains. The campaign utilizes unique tools and platforms to carry out phishing attacks, including sending messages through iMessage and RCS protocols. The attackers primarily target postal services and other institutions that rely on consumer trust.…

Read More

Threat Actor: Unknown Victim: Shivaji College – University of Delhi

Information: 🌟 The threat actor allegedly breached the database of Shivaji College. 🌟 The compromised data includes student and teacher records, student cards with pictures, surveys, feedback, and additional documents containing Personally Identifiable Information (PII). 🌟 The attack occurred in March 2024.…

Read More

Threat Actor: USDoD Victim: FICO

Information: 🌟 USDoD is the threat actor responsible for the alleged leak of FICO’s database. 🌟 FICO is a prominent analytics software company operating in over 90 countries. 🌟 The leaked database contains 170,000 rows in CSV format. 🌟 Personal and professional details of individuals linked to FICO are included in the leak.…

Read More

Threat Actor: Unknown threat actor Victim: 16 companies (names not provided)

Information: 🌟 The threat actor is offering unauthorized access to 16 companies. 🌟 The compromised entities include small-scale enterprises and medium-scale corporations. 🌟 The sectors of the compromised companies include Hospitality, Food & Beverage, Finance, IT, Federal, Business Services, and Logistics Services.…

Read More

Threat Actor: Unknown Victim: Mexican Government

Information: 🌟 Unauthorized domain administrator access to a prominent entity within the Mexican government. 🌟 Access extends to more than 1000 employee accounts, including domain administrator and enterprise-level credentials. 🌟 The compromised system contains approximately 10 terabytes of data. 🌟 The threat actor is willing to sell this illicit access for $3500.…

Read More