🔪 Slice For Life - Part 2 🔪
3.07K subscribers
658 photos
15 videos
466 links
Download Telegram
‼️🇵🇦 MiniMed Panama, the largest private primary healthcare network in Panama, has allegedly been breached, with approximately 400,000 records leaked spanning patients, doctors, and medical imaging data.

‣ Threat Actor: ohmydays (Waxx Org.)
‣ Category: Data Leak
‣ Victim: MiniMed Panama (Clínica Laboratorio)
‣ Industry: Healthcare

The actor claims access was obtained due to default credentials left on the client's systems by their vendor LATAM MAXIA. Two compromised systems were identified with weak credentials. MiniMed operates over 14 clinics and a hospital in Panama City.

What's in it:

▪️ ~400,000 total records
▪️ usersdata (74,233): user PII, plaintext passwords, names, usernames, emails, phones, job titles, access levels
▪️ patients (156,869): patient PII, national IDs, names, gender, emails, phones, addresses, DOB, marital status, nationality
▪️ patientsexams (99,304): medical imaging records, patient names, DOB/age, gender, study descriptions, modalities, dates, referring doctors, report/image status
▪️ doctorsinfo (521): doctor PII, plaintext passwords, national IDs, names, emails, phones, specialty, doctor type, status
▪️ appointments (23,511): patient/doctor/radiologist/tech IDs, dates, study types, modalities, payment methods, organizations
▪️ appointmentsnames (23,507): appointment summaries, patient IDs/names, dates/times, study names, modalities, status
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1
‼️🇫🇷 Profil Search, a French recruitment platform (CDD-CDI solutions), has allegedly been breached, with a database of 100,642 candidate records leaked.

‣ Threat Actor: Lagui
‣ Category: Data Leak
‣ Victim: Profil Search
‣ Industry: Recruitment / HR

The actor states the data was obtained approximately a year ago and is being released to the community. Sample records show candidate application data including PII and contact information.

What's in it:

▪️ 100,642 complete candidate entries
▪️ Title (Mme/M.)
▪️ First and last names
▪️ Email addresses
▪️ Phone numbers (multiple)
▪️ Full postal addresses
▪️ Postal codes and cities
▪️ Country
▪️ Job titles / positions applied for
▪️ Employer / company information
▪️ Candidate application IDs / URLs
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇨🇦 Ontario College of Health & Technology has allegedly been breached, with student databases exfiltrated via an unpatched WHM (WebHost Manager) vulnerability.

‣ Threat Actor: Shinigami
‣ Category: Data Leak
‣ Victim: Ontario College of Health & Technology
‣ Industry: Education

The actor attributes the May 2026 breach to a critical authentication bypass vulnerability (CVE-2026-41940) in an unpatched WHM (WebHost Manager) installation. The flaw allowed unauthorized administrative access to the college's server, leading to the exfiltration of student databases.

What's in it:

▪️ Student names
▪️ Email addresses
▪️ Phone numbers
▪️ Residential addresses
▪️ Student records stored across several SQL databases
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
I added another new API endpoint for compromise lookups. One request for a domain or organization will provide data on whether either were compromised against the Ransomware feed, Threat feed, Whiteintel stealer lookup, and HIBP breach lookup. Review the note at the top of the API pages. Interested in subscribing: https://darkwebinformer.com/api-details/
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ Instructure Holdings, Inc. (Canva LMS, instructure.com) and Cushman & Wakefield Inc. have been claimed by ShinyHunters
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇫🇷 Actradis (app.actradis.fr), a French B2B compliance and administrative document management platform, has allegedly been scraped, with over 305,000 records leaked across two distinct files.

‣ Threat Actor: Lagui
‣ Category: Data Leak
‣ Victim: Actradis
‣ Industry: B2B / Compliance / Administrative Services

The actor claims the data was scraped just a day prior to posting and is completely fresh, never circulated elsewhere. Sample records show detailed corporate client and case-tracking information including invoices, supplier relationships, and internal communication histories.

What's in it:

▪️ File 1 (clients_all.jsonl): 82,611 complete client entries
- SIREN numbers, intra-community VAT numbers, company names
- Full addresses, country, NAF codes (business activity)
- Activity descriptions
- Subscription/client status, file dossier creation and renewal dates
- Mandate types (collection, insurance, diffusion, procurement)
- Document counts, invoice counts, full invoice histories with amounts and dates
- Supplier lists with SIREN, status, and relationship details

▪️ File 2 (suivi_all.jsonl): 222,473 complete tracking entries
- SIREN, VAT numbers, internal company device IDs
- Commercial agent assignments, client status, action dates
- Contact details: manager names, roles, emails, phone numbers
- Internal notes and communication histories
- Full historical logs (id_histo) with timestamps, commercial agent, communication type (call, mail, etc.), and message content
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇮🇱 Crocs Israel (crocs.co.il), the Israeli branch of the global footwear brand, has allegedly been breached, with a customer database of 852,520 records leaked.

‣ Threat Actor: campfire
‣ Category: Data Leak
‣ Victim: Crocs Israel
‣ Industry: Retail / Footwear

The actor claims the breach occurred on May 3, 2026 and is selling the database for $350.

What's in it:

▪️ 852,520 customer records
▪️ Customer ID
▪️ First and last names
▪️ Phone numbers
▪️ Email addresses
▪️ Addresses
▪️ Date of birth
▪️ Gender
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇺🇸 Senzing (sezning.com), a U.S.-based AI software company specializing in handling and cleaning complex data, has allegedly been breached, with 100,002 records leaked containing extensive PII.

‣ Threat Actor: ijpys
‣ Category: Data Leak
‣ Victim: Senzing
‣ Industry: Software / AI / Data Management

What's in it:

▪️ 100,002 records
▪️ Entity ID and Record ID
▪️ First name, last name, name suffix
▪️ Phone numbers
▪️ Social handles
▪️ SSN (Social Security Numbers)
▪️ Passport numbers
▪️ Gender
▪️ Date of birth
▪️ Driver's license numbers
▪️ Credit card account numbers
▪️ Full addresses (line 1, city, postal code, state)
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇫🇷 ZenMobile (zenmobile.fr), a French mobile virtual network operator (MVNO), has allegedly been re-leaked, with a database containing over 15 million rows reposted on a hacking forum.

‣ Threat Actor: NormalLeVrai
‣ Category: Data Leak (Repost)
‣ Victim: ZenMobile
‣ Industry: Telecommunications / MVNO

The actor is reposting the 15M-France-zenmobile.fr-Mobile-Virtual-Network-Operator-FullDump-sql, originally circulated previously. ZenMobile operates as a French MVNO using major operator networks (Orange, SFR, Bouygues, Free) to provide phone and internet packages.

What's in it:

▪️ 15+ million rows from ZenMobile
▪️ Customer IDs and titles (Mme/M.)
▪️ First and last names
▪️ Full postal addresses (street, building, city, postal code)
▪️ Phone numbers
▪️ Email addresses
▪️ Date of birth
▪️ Account creation dates
▪️ URLs accessed by customers (form/promo participation links)
▪️ Argumentation status / department codes
▪️ Marketing source (e.g., WebRivage)
▪️ Activity timestamps
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ CVE-2026-41940: A high-performance, multi-threaded security auditing tool designed to detect CVE-2026-41940, a critical Authentication Bypass vulnerability in cPanel & WHM.

https://github.com/XsanFlip/poc-cpanel-cve-2026-41940
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1
‼️🇫🇷 Psycho-Prat (École de Psychologues Praticiens), a French psychology school, has allegedly been breached, with a 55 GB database and complete source code leaked.

‣ Threat Actor: Spirigatito
‣ Category: Data Leak
‣ Victim: Psycho-Prat (École de Psychologues Praticiens)
‣ Industry: Education

The actor is offering the full 55 GB dataset for download. The leak includes student and teacher personal information, identity documents, course materials, account credentials, and the complete source code of the Psycho-Prat platform.

What's in it:

▪️ 55 GB of total data
▪️ Student information including 11,447 documents: national ID cards, passports, IBANs, diplomas, applications + database
▪️ 10,506 photos of students and teachers
▪️ 5,521 course documents (valued at $8,000)
▪️ All Psycho-Prat accounts and connection logs
▪️ Complete Psycho-Prat source code totaling 85,424 files
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1