๐Ÿ”ช Slice For Life ๐Ÿ”ช
3.39K subscribers
834 photos
2 videos
695 links
Download Telegram
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: Die Linke
Domain: die-linke.de

Country: ๐Ÿ‡ฉ๐Ÿ‡ช DE
Date: Mar 26th, 2026

Summary:
The German political party Die Linke reported a cybersecurity incident involving ransomware attributed to the Russian hacker group Qilin, forcing the party to take its infrastructure offline on Thursday. While the party has filed a complaint and is in contact with authorities, member data was not compromised and the extent of affected internal data remains to be determined. This event is part of a series of attacks targeting German political parties, with the CDU also falling victim to a cyberattack in May 2024.

Source: https://www.heise.de/news/Qilin-Linkspartei-meldet-russischen-Ransomware-Angriff-11227181.html
๐Ÿ‡ช๐Ÿ‡บ Europol Press Release
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Major operation targets one of Scotlandโ€™s most violent crime networks

Full Press Release โ†’ europol.europa.eu

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
๐Ÿ•ต๏ธ Dark Web Informer โ€ข Europol Monitor
โ€ผ๏ธ Caine, the current owner of BreachForums, sent the following email out...
โ€ผ๏ธ BreachForums mod team has retired and Caine claims he was scammed out of $5,000 by Loki.

Can you guys please just retire the forum? Building from scratch with some of your aliases is enough to make it a top 5/10 forum very easily.
โค3๐Ÿ˜2
โš ๏ธ FBI Watchdog - DNS New Domain (A) โš ๏ธ
๐Ÿ”— DarkWebInformer.com - Cyber Threat Intelligence

Domain: handala-team.to
Record Type: DNS New Domain (A)
Time Detected: 2026-03-27 14:35:30 UTC

Previous Records:
None

New Records:
185.178.208.137
im going to guess their new domain will be seized at some point lul
๐Ÿ˜1
โ€ผ๏ธ๐Ÿ‡จ๐Ÿ‡ด A massive breach of the Superintendencia Nacional de Salud de Colombia (Supersalud), Colombia's national health oversight authority, is being leaked on a popular cybercrime forum. This is labeled as "Package 1" with more threatened to follow.

โ–ช๏ธ Total Records: 50 million lines
โ–ช๏ธ Total Size: 2TB (full database)

The exposed data is extremely sensitive, covering patient records, healthcare claims, and internal systems including: PQR numbers and internal record IDs, patient full names, document type/number, DOB, age, gender, phone, email, full address, special population status, education level, affiliated health entity (EPS) and regime type, associated clinic/provider (IPS) with branch location and NIT, diagnosed pathology category and ICD-10 codes, life-risk priority status, high cost disease (Alto Costo) indicators, full claim descriptions with urgency and assigned doctor, PQR internal follow-up logs with agent comments and resolution statuses, claim deadlines, medication details (drugs, quantities, authorization status), and petitioner details.

The leak also includes internal system data such as staff names, emails, password hashes, roles, IDs, cedula numbers, LDAP Active Directory status, and SuperSalud internal department routing and entity notification statuses.
โค1
โ€ผ๏ธ Handala Hack is currently claiming a breach of a widespread disruption in point-of-sale systems across chain stores throughout the United States. No other details were provided by the group.
โค1๐Ÿ”ฅ1
โ€ผ๏ธ๐Ÿ‡บ๐Ÿ‡ธ The group ShadowByt3$ claims to have breached the University of Georgia, stealing approximately 3.2 MB of employee data in raw text files. No customer data was reportedly affected.

โ–ช๏ธ Physical Locations: Home addresses (e.g., Columbus, GA) and specific office numbers
โ–ช๏ธ Private Contact Info: Personal cell and home phone numbers
โ–ช๏ธ Employee Info: Full names, contact details, institutional ID photos
โ–ช๏ธ Project Documentation: Internal university project tracking logs and admin data
โ–ช๏ธ Workforce Data: Position numbers, departmental assignments, work schedules
โ–ช๏ธ Technical Details: System maintenance and development notes
โ–ช๏ธ Critical Infrastructure: Active project maps for GEMA (Emergency Management), Georgia Broadband, and GDOT (Transportation) through 2026
โ–ช๏ธ Government Records: Asset forfeiture logs and county-level GIS (Athens-Clarke, Bibb) underpinning 911 dispatch and land taxes
โ–ช๏ธ Leadership Secrets: UGA Office of the President Mail Tracker and Gov360 anonymous executive coaching logs
โ–ช๏ธ SME Map: Identified "Subject Matter Experts" with detailed work hour tracking on specific code projects
โ–ช๏ธ Security Clearances: Differentiation between "Benefited" full-time employees (high-value targets) and "Student Assistants" (low-value entry points)
โค1
โ€ผ๏ธ๐Ÿ‡ฒ๐Ÿ‡ฝ The Mexico dataset of C&A Modas, the international fashion retailer, has allegedly been leaked and made available for download on a popular cybercrime forum.

โ–ช๏ธ Records: 286,094 lines

The sample data shows Mexican customer records with full names, dates of birth, unique customer IDs, phone numbers, and personal email addresses.
โ€ผ๏ธ๐Ÿ‡ฒ๐Ÿ‡ฝ A database allegedly belonging to the Instituto Tecnolรณgico Superior de Irapuato, a Mexican higher education institution, has been leaked on a popular cybercrime forum.

Exposed fields reportedly include: full name (nombre completo), paternal surname (apellido paterno), maternal surname (apellido materno), phone number, personal Gmail, date of birth, address (domicilio), age, CURP (Mexican national ID number), career/major, disability status, income received (dinero que recibe), and more.
๐Ÿ”ฅ1
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: Omax Autos Limited
Domain: omaxauto.com

Country: ๐Ÿ‡ฎ๐Ÿ‡ณ IN
Date: Mar 27th, 2026
Claimed by: Lockbit5 ransomware gang

Summary:
Omax Autos Limited confirmed on March 27, 2026 that it suffered a ransomware attack on its IT infrastructure, following the detection of suspicious anomalies the day before. Although the company reported the incident to the Bombay and Delhi stock exchanges, it specified that its core operations and production chains remain currently intact. Investors reacted with volatility to the news, fluctuating between confidence in the security of critical systems and concerns related to a potential leak of sensitive data.

Source: https://tradebrains.in/omax-autos-reports-ransomware-attack-it-systems-under-investigation-after-cyber-breach/
โ€ผ๏ธ๐Ÿ‡ฒ๐Ÿ‡ฝ A database allegedly containing 318,000 user records from Bienestar.org, a healthcare organization serving the Latino Gay Community with HIV/AIDS treatment, sexual health, mental health, substance abuse counseling, and medication-assisted treatment since 1989, is being sold on a popular cybercrime forum.

โ–ช๏ธ Records: 318,000 users
โ–ช๏ธ Data Fields: First name, last name, mobile phone number, email, date of birth
โ–ช๏ธ Price: $300

Given the nature of the organization, this breach is particularly sensitive as it could potentially expose individuals' sexual orientation and healthcare status. The listing includes both the dataset and access to the platform.
๐Ÿ˜ญ3
โ€ผ๏ธ๐Ÿ‡ฆ๐Ÿ‡ช Source code from multiple UAE websites has allegedly been leaked on a popular cybercrime forum, including exposed repositories and projects.

โ–ช๏ธ Country: UAE
โ–ช๏ธ Leak Type: Source code + exposed repositories/projects
โ–ช๏ธ Includes: PHP code samples and GitHub Personal Access Token (PAT)

The post lists multiple affected platforms and includes a PHP code sample as proof.
โ€ผ๏ธ๐Ÿ‡ฆ๐Ÿ‡ช A threat actor claims to be selling admin access to an unidentified retail company from the UAE.