πͺπΊ Europol Press Release
βββββββββββββββββββββ
Europol leads international operation against environmental crime and waste trafficking
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
Europol leads international operation against environmental crime and waste trafficking
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
Europol leads international operation against environmental crime and waste trafficking β International law enforcement operationβ¦
Europol has successfully coordinated a large-scale operation targeting organised crime networks involved in waste and pollution crime. The global operation, code-named βCustos Viridisβ, took place between January and December 2025 on five continents, withβ¦
πͺπΊ Europol Press Release
βββββββββββββββββββββ
European Day of Remembrance for Victims of Terrorism
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
European Day of Remembrance for Victims of Terrorism
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
European Day of Remembrance for Victims of Terrorism | Europol
Today, as we mark the 22nd European Remembrance Day for Victims of Terrorism, we honour those who lost their lives and reflect on the impact of terrorism on our communities. This year, in particular, we commemorate the 10th anniversary of the attacks in Brusselsβ¦
πͺπΊ Europol Press Release
βββββββββββββββββββββ
From a small Swedish town to a global crime network: international operation strikes top-tier organised crime
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
From a small Swedish town to a global crime network: international operation strikes top-tier organised crime
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
From a small Swedish town to a global crime network: international operation strikes top-tier organised crime β Fifteen arrestedβ¦
Forensic analysis revealed not one organised crime group, but multiple interconnected networks involved in large-scale drug trafficking and money laundering. They were bound together by a web of companies and other structures.Most of the key targets identifiedβ¦
πͺπΊ Europol Press Release
βββββββββββββββββββββ
12 members of money laundering scheme exploiting Ukrainian women arrested in Spain
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
12 members of money laundering scheme exploiting Ukrainian women arrested in Spain
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
12 members of money laundering scheme exploiting Ukrainian women arrested in Spain β Authorities identified 55 victims followingβ¦
An international operation in Spain targeting a money laundering scheme resulted in the arrest of 12 suspects. The disrupted criminal network systematically exploited vulnerable Ukrainian women to open bank accounts, which were used in gaming platforms andβ¦
πͺπΊ Europol Press Release
βββββββββββββββββββββ
Invitation - Press conference: From two seized phones to a global criminal web
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
Invitation - Press conference: From two seized phones to a global criminal web
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
Invitation - Press conference: From two seized phones to a global criminal web β International operation exposes global criminalβ¦
A press conference will be held on Friday 6 March 2026 at 10:00 CET to unveil the results of a major international investigation that began with the seizure of two mobile phones in a small Swedish town - and exposed a global criminal web stretching acrossβ¦
πͺπΊ Europol Press Release
βββββββββββββββββββββ
Five-country operation targets cigarette smuggling network operating from the UK
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
βββββββββββββββββββββ
Five-country operation targets cigarette smuggling network operating from the UK
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Europol
Five-country operation targets cigarette smuggling network operating from the UK | Europol
A large organised crime group suspected of smuggling counterfeit cigarettes into Europe has been targeted in a coordinated operation across five countries on 24 March.
The action day, led by the European Public Prosecutorβs Office (EPPO) in Turin, Italyβ¦
The action day, led by the European Public Prosecutorβs Office (EPPO) in Turin, Italyβ¦
βΌοΈπ°π A threat actor using the handle "UNIT_PEGASUS" is auctioning network access to a Cambodian telecommunications company with an estimated revenue of ~$180 million on a dark web forum. The access type is listed as GlobalProtect + RDP with domain user (local admin) privileges.
The compromised network reportedly includes 2 domain controllers and over 200 computers, with CrowdStrike (CS) identified as the antivirus solution in place.
The auction starts at $4,000 with $200 bidding increments and a blitz (buy now) price of $8,000.
The compromised network reportedly includes 2 domain controllers and over 200 computers, with CrowdStrike (CS) identified as the antivirus solution in place.
The auction starts at $4,000 with $200 bidding increments and a blitz (buy now) price of $8,000.
βΌοΈA threat actor using the handle "fanfan" has leaked the database of 17Media, a popular live streaming app previously operating under the domain 17.media, on a dark web forum. The breach dates back to April 2016 and contains 28,052,321 records in a single SQL file.
Exposed data includes OpenID, MD5-hashed passwords (unsalted), country code, phone number, IP address, email, device type, and device model.
The actor describes the original incident as a large-scale breach that compromised personal data from over 27 million user accounts through the platform's shared video content connectivity features. A data snippet was provided as proof.
Exposed data includes OpenID, MD5-hashed passwords (unsalted), country code, phone number, IP address, email, device type, and device model.
The actor describes the original incident as a large-scale breach that compromised personal data from over 27 million user accounts through the platform's shared video content connectivity features. A data snippet was provided as proof.
βΌοΈπ―π΅ The first claim of the Crunchyroll breach has hit a popular dark web forum.
A threat actor using the handle "hubert" is selling a partial Crunchyroll Zendesk database.
The breach is dated March 2026 and targets the leading global anime and East Asian entertainment streaming service, which has an estimated yearly revenue of $1.16 billion to $1.4 billion and a valuation between $3 billion and $5 billion.
The leaked data consists of 2,000,000 support tickets containing 1,394,207 unique email addresses.
An extensive sample of the raw Zendesk ticket data was provided as proof, spanning multiple screenshots showing structured JSON-like support ticket records with detailed user and ticket metadata.
The asking price is $2,000 with a "Guarantee ++" designation.
A threat actor using the handle "hubert" is selling a partial Crunchyroll Zendesk database.
The breach is dated March 2026 and targets the leading global anime and East Asian entertainment streaming service, which has an estimated yearly revenue of $1.16 billion to $1.4 billion and a valuation between $3 billion and $5 billion.
The leaked data consists of 2,000,000 support tickets containing 1,394,207 unique email addresses.
An extensive sample of the raw Zendesk ticket data was provided as proof, spanning multiple screenshots showing structured JSON-like support ticket records with detailed user and ticket metadata.
The asking price is $2,000 with a "Guarantee ++" designation.
βΌοΈπΊπΈ MAJOR CLAIM: A threat actor using the handle "luc1f3rg4ng" is claiming to sell insider-sourced documents from United Health Group (UHG), described as the largest healthcare provider in the United States, on a dark web forum. The data reportedly spans 2024β2026 and contains over 500,000 records of UHG clients based in Florida.
The exposed data includes highly sensitive personal and healthcare information such as SSN, date of birth, address, phone number, region, coverage dates, plan names, Medicaid care coordination details, case numbers, enrollment and disenrollment dates, and provider information.
The sample data reveals full names, specific Florida addresses (Miami, Miami-Dade, Jacksonville), and detailed insurance records tied to individual patients.
The actor claims the documents were sourced from an insider with access to confidential company documents and provides three image links as proof of insider access.
The asking price is $350,000 for the full dataset, with the option to sell as a bundle or in parts. The actor also notes that once all data is sold, they will consider selling the insider access itself.
The exposed data includes highly sensitive personal and healthcare information such as SSN, date of birth, address, phone number, region, coverage dates, plan names, Medicaid care coordination details, case numbers, enrollment and disenrollment dates, and provider information.
The sample data reveals full names, specific Florida addresses (Miami, Miami-Dade, Jacksonville), and detailed insurance records tied to individual patients.
The actor claims the documents were sourced from an insider with access to confidential company documents and provides three image links as proof of insider access.
The asking price is $350,000 for the full dataset, with the option to sell as a bundle or in parts. The actor also notes that once all data is sold, they will consider selling the insider access itself.
π2
βΌοΈA threat actor with the handle "punk" holding a Manager rank has leaked the database of Cuties.AI, a popular AI editor website, on a dark web forum. The breach is dated March 2026 and contains data from over 153,000 unique users.
Compromised fields include email, nickname, type, avatar, generation tokens, active plan, can_send_message, can_generate_character, can_request_image, has_standard_subscription, age_verified, allowed_feed_count, standard_subscription_cancel_at, standard_subscription_expire_at, preference_type, source_brand, and uid.
Compromised fields include email, nickname, type, avatar, generation tokens, active plan, can_send_message, can_generate_character, can_request_image, has_standard_subscription, age_verified, allowed_feed_count, standard_subscription_cancel_at, standard_subscription_expire_at, preference_type, source_brand, and uid.
π₯ I am in the process of adding a couple more forums and other resources to the threat feed. You should have seen a couple already in the last couple of days/hours. Alerts should balloon from around 200 daily to possibly 400 daily.
Finetuning is in process.
Finetuning is in process.
Normal, thee founder of OVHcloud denies your claim. If you want to be taken seriously you need to provide a broader sample or something. https://x.com/olesovhcom/status/2036316608486875292
X (formerly Twitter)
Octave Klaba (@olesovhcom) on X
le sample citΓ© ne se trouve pas dans nos bases.
βΌοΈπ¨π± A threat actor group using the handle "NyxarGroup" has leaked the database of Universidad CatΓ³lica de Temuco, a Chilean university, on a dark web forum. The breach contains 70,000 records including student photos and is being offered for free.
Exposed fields include photo, student ID, RUT (Chilean national identification number), names, paternal surname, maternal surname, primary and secondary phone/cell numbers, institutional email, personal email, race, data institution, registration year, admission details, and career information.
Exposed fields include photo, student ID, RUT (Chilean national identification number), names, paternal surname, maternal surname, primary and secondary phone/cell numbers, institutional email, personal email, race, data institution, registration year, admission details, and career information.