βΌοΈ New Dark Web Informer Blog Post!
Title: When the Watchman Gets Watched: Trellix Discloses Source Code Breach
Link: https://darkwebinformer.com/when-the-watchman-gets-watched-trellix-discloses-source-code-breach/
Title: When the Watchman Gets Watched: Trellix Discloses Source Code Breach
Link: https://darkwebinformer.com/when-the-watchman-gets-watched-trellix-discloses-source-code-breach/
Dark Web Informer
When the Watchman Gets Watched: Trellix Discloses Source Code Breach
There's something uniquely unsettling about a cybersecurity company getting hacked. It's the digital equivalent of a locksmith calling to say someone picked their front door. This week, Trellix joined that uncomfortable club, confirming that attackers gainedβ¦
βΌοΈ New Dark Web Informer Blog Post!
Title: "Copy Fail" Lands on CISA's KEV: A Nine-Year-Old Linux Bug Becomes a Patch Deadline
Link: https://darkwebinformer.com/copy-fail-lands-on-cisas-kev-a-nine-year-old-linux-bug-becomes-a-patch-deadline/
Title: "Copy Fail" Lands on CISA's KEV: A Nine-Year-Old Linux Bug Becomes a Patch Deadline
Link: https://darkwebinformer.com/copy-fail-lands-on-cisas-kev-a-nine-year-old-linux-bug-becomes-a-patch-deadline/
Dark Web Informer
"Copy Fail" Lands on CISA's KEV: A Nine-Year-Old Linux Bug Becomes a Patch Deadline
On May 1, 2026, CISA added CVE-2026-31431, better known as "Copy Fail," to its Known Exploited Vulnerabilities (KEV) catalog. Federal civilian agencies have until May 15 to patch under BOD 22-01. Everyone else should read that deadline as a strong hint.
βΌοΈπ¨π Zurich Insurance has allegedly been breached, with a massive leak containing over 4.26 million insurance contract records and a second file covering insurance policies released for free.
β
β£ Threat Actor: NormalLeVrai
β£ Category: Data Leak
β£ Victim: Zurich Insurance (zurich.com)
β£ Industry: Insurance
β
The actor is releasing two Swiss-related files containing structured insurance data, including detailed contract, policyholder, vehicle, and financial information.
β
What's in it:
β
First file (zurich.com.csv): 4,260,757 complete lines of structured insurance data:
- Insurance contracts (policies)
- Clients (policyholders)
- Insured vehicles
- Intermediaries (agents)
- Financial and commercial information
- Coverage details and insured amounts
- Product-specific information (home, business insurance)
- Primary driver and owner data
- Business indicators (status, assistance options, customer value)
β
Second file (lluch20210629.sql): complete dataset on insurance contracts:
- Policy information: contract number, version, product type, structure, key dates
- Policyholder data: identity (last name, first name), national ID/Tax ID, contact info (address, phone, email)
- Insured vehicle info: registration number, make, model, technical specs (power, engine type, seats)
- Intermediary (agent/broker) info: identifier, name, contact details
- Contractual and financial elements: IBAN, receipt status, insured capital, deductibles, contract terms
- Product-specific data (residential/commercial): property use, dwelling type, business activity
- Linked individuals: primary driver and vehicle owner
- Business indicators: policy status, customer value, up to 10 assistance options
- Additional info: contract language, insurance company, chosen package/plan
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β
β£ Threat Actor: NormalLeVrai
β£ Category: Data Leak
β£ Victim: Zurich Insurance (zurich.com)
β£ Industry: Insurance
β
The actor is releasing two Swiss-related files containing structured insurance data, including detailed contract, policyholder, vehicle, and financial information.
β
What's in it:
β
First file (zurich.com.csv): 4,260,757 complete lines of structured insurance data:
- Insurance contracts (policies)
- Clients (policyholders)
- Insured vehicles
- Intermediaries (agents)
- Financial and commercial information
- Coverage details and insured amounts
- Product-specific information (home, business insurance)
- Primary driver and owner data
- Business indicators (status, assistance options, customer value)
β
Second file (lluch20210629.sql): complete dataset on insurance contracts:
- Policy information: contract number, version, product type, structure, key dates
- Policyholder data: identity (last name, first name), national ID/Tax ID, contact info (address, phone, email)
- Insured vehicle info: registration number, make, model, technical specs (power, engine type, seats)
- Intermediary (agent/broker) info: identifier, name, contact details
- Contractual and financial elements: IBAN, receipt status, insured capital, deductibles, contract terms
- Product-specific data (residential/commercial): property use, dwelling type, business activity
- Linked individuals: primary driver and vehicle owner
- Business indicators: policy status, customer value, up to 10 assistance options
- Additional info: contract language, insurance company, chosen package/plan
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
π₯1
βΌοΈ New Dark Web Informer Blog Post!
Title: When a Screensaver Cracked the Internet's Trust Layer: Inside the DigiCert Hack
Link: https://darkwebinformer.com/when-a-screensaver-cracked-the-internets-trust-layer-inside-the-digicert-hack/
Title: When a Screensaver Cracked the Internet's Trust Layer: Inside the DigiCert Hack
Link: https://darkwebinformer.com/when-a-screensaver-cracked-the-internets-trust-layer-inside-the-digicert-hack/
Dark Web Informer
When a Screensaver Cracked the Internet's Trust Layer: Inside the DigiCert Hack
Certificate authorities sit at the foundation of online trust. So when one of the largest, DigiCert, gets hacked through a fake screenshot in a customer support chat, it is worth paying attention.
π1
βΌοΈπ¦πͺ Handala Hack has launched a coordinated attack on the Fujairah Port and other entities in the UAE.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€1
βΌοΈπ«π· Bouygues Telecom, one of France's largest telecommunications providers, has allegedly been breached, with an 80.9 GB database being offered for sale by a new threat actor group.
β
β£ Threat Actor: OverSec
β£ Category: Data Sale
β£ Victim: Bouygues Telecom
β£ Industry: Telecommunications
β
The actor introduces themselves as "OverSec" and announces this as their first claim, offering the Bouygues Telecom database obtained on May 1, 2026. Database fields and a sample are distributed via Pastebin links, with proof of access and negotiations available through Session.
β
What's in it:
β
βͺοΈ Total size: 80.9 GB (86,876,683,642 bytes)
βͺοΈ Format: JSONL
βͺοΈ Date: May 1, 2026
βͺοΈ Database fields and sample distributed via Pastebin
βͺοΈ Contact: Session ID provided
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β
β£ Threat Actor: OverSec
β£ Category: Data Sale
β£ Victim: Bouygues Telecom
β£ Industry: Telecommunications
β
The actor introduces themselves as "OverSec" and announces this as their first claim, offering the Bouygues Telecom database obtained on May 1, 2026. Database fields and a sample are distributed via Pastebin links, with proof of access and negotiations available through Session.
β
What's in it:
β
βͺοΈ Total size: 80.9 GB (86,876,683,642 bytes)
βͺοΈ Format: JSONL
βͺοΈ Date: May 1, 2026
βͺοΈ Database fields and sample distributed via Pastebin
βͺοΈ Contact: Session ID provided
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Notepad now gaslights you about what you just typed
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
π4
βΌοΈπ«π· La Redoute, a major French e-commerce and home goods retailer, has allegedly been scraped, with a dataset of 96,191 customer expedition (shipment) records leaked.
β
β£ Threat Actor: Lagui
β£ Victim: La Redoute
β£ Industry: Retail / E-commerce
β
The actor states the data was scraped a few weeks prior to posting and is completely fresh, never circulated elsewhere. The scrape focuses on shipment/expedition records spanning late 2025 through 2026, including detailed package tracking and delivery event histories.
β
What's in it:
β
βͺοΈ 96,191 complete expedition (shipment) entries
βͺοΈ Expedition IDs and order numbers
βͺοΈ Client IDs
βͺοΈ Customer first names and last names
βͺοΈ Full addresses, postal codes, cities
βͺοΈ Phone numbers (multiple per record)
βͺοΈ Email addresses
βͺοΈ Package IDs, arrival dates, creation dates
βͺοΈ Store/enseigne information (e.g., "(01) LA REDOUTE")
βͺοΈ Delivery type (Relais, Livraison)
βͺοΈ Order quantities, declared volume and weight
βͺοΈ Recycling status
βͺοΈ Detailed event histories: agent names, timestamps, event descriptions, operation dates, package rank and status (e.g., package pickup, retour, livraison confirmation, EDI announcements)
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β
β£ Threat Actor: Lagui
β£ Victim: La Redoute
β£ Industry: Retail / E-commerce
β
The actor states the data was scraped a few weeks prior to posting and is completely fresh, never circulated elsewhere. The scrape focuses on shipment/expedition records spanning late 2025 through 2026, including detailed package tracking and delivery event histories.
β
What's in it:
β
βͺοΈ 96,191 complete expedition (shipment) entries
βͺοΈ Expedition IDs and order numbers
βͺοΈ Client IDs
βͺοΈ Customer first names and last names
βͺοΈ Full addresses, postal codes, cities
βͺοΈ Phone numbers (multiple per record)
βͺοΈ Email addresses
βͺοΈ Package IDs, arrival dates, creation dates
βͺοΈ Store/enseigne information (e.g., "(01) LA REDOUTE")
βͺοΈ Delivery type (Relais, Livraison)
βͺοΈ Order quantities, declared volume and weight
βͺοΈ Recycling status
βͺοΈ Detailed event histories: agent names, timestamps, event descriptions, operation dates, package rank and status (e.g., package pickup, retour, livraison confirmation, EDI announcements)
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπΊπΈ Johnson & Johnson Innovative Medicine has been claimed a victim to SpaceBears Ransomware
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ DOJ Press Release
βββββββββββββββββββββ
Member of Prolific Russian Ransomware Group Sentenced to Prison
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
Member of Prolific Russian Ransomware Group Sentenced to Prison
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
Member of Prolific Russian Ransomware Group Sentenced to Prison
A Latvian national was sentenced today to 102 months in prison for his role in a major Russian ransomware organization that stole from and extorted over 54 companies.
βΌοΈLexus has been claimed a victim to Qilin Ransomware
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπ¬πΉπͺπ¨ Azzorti, a Latin American direct-sales beauty and fashion brand operating across Guatemala and Ecuador, has allegedly been breached, with the entire database from intranet.azzorti.com and intranet.azzorti.gt offered for sale.
β
β£ Threat Actor: NyxarGroup (in collaboration with Petro_Escobar & ArcRaidersPlayer)
β£ Category: Data Sale
β£ Victim: Azzorti
β£ Industry: Retail / Direct Sales / Cosmetics
β
The actor is selling access to two intranet sites belonging to Azzorti, claiming the dataset includes business operations data alongside customer/consultant PII. The leak is offered for $400.
β
What's in it:
β
βͺοΈ Internal documents
βͺοΈ Power BI reports
βͺοΈ Supplier information
βͺοΈ Product catalogs
βͺοΈ Sales records
βͺοΈ Business charts
βͺοΈ Quotes
βͺοΈ 2 databases with the following structure:
βͺοΈCodigo (code), Identificacion (ID), Consec
βͺοΈZona (zone)
βͺοΈNombres / Apellidos (first/last names)
βͺοΈDireccion (address)
βͺοΈTelefonos (phone numbers)
βͺοΈDistrito / Provincia (district/province)
βͺοΈCamp Ingr, Digito, Cupo
βͺοΈPedidos (orders)
βͺοΈDigito Anterior
βͺοΈDireccion Referencia (reference address)
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β
β£ Threat Actor: NyxarGroup (in collaboration with Petro_Escobar & ArcRaidersPlayer)
β£ Category: Data Sale
β£ Victim: Azzorti
β£ Industry: Retail / Direct Sales / Cosmetics
β
The actor is selling access to two intranet sites belonging to Azzorti, claiming the dataset includes business operations data alongside customer/consultant PII. The leak is offered for $400.
β
What's in it:
β
βͺοΈ Internal documents
βͺοΈ Power BI reports
βͺοΈ Supplier information
βͺοΈ Product catalogs
βͺοΈ Sales records
βͺοΈ Business charts
βͺοΈ Quotes
βͺοΈ 2 databases with the following structure:
βͺοΈCodigo (code), Identificacion (ID), Consec
βͺοΈZona (zone)
βͺοΈNombres / Apellidos (first/last names)
βͺοΈDireccion (address)
βͺοΈTelefonos (phone numbers)
βͺοΈDistrito / Provincia (district/province)
βͺοΈCamp Ingr, Digito, Cupo
βͺοΈPedidos (orders)
βͺοΈDigito Anterior
βͺοΈDireccion Referencia (reference address)
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 4th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-4th-2026/
Title: Daily Dose of Dark Web Informer - May 4th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-4th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 4th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
βΌοΈπ§π· IUNGO Cloud (iungo.cloud), a Brazilian cloud-telephony operator, has allegedly been breached, with a 73 GiB portabilling database offered for sale as a one-time exclusive deal.
β
β£ Threat Actor: Fronx
β£ Category: Data Sale
β£ Victim: IUNGO Cloud
β£ Industry: Cloud Telephony / SaaS Communications
β
IUNGO provides cloud-based telephony services including hosted PBX, virtual extensions (ramais), contact centers, and omnichannel customer contact for SMBs and enterprises in Brazil. The actor is offering the database as a one-time sale.
β
What's in it:
β
βͺοΈ 73 GiB portabilling database
βͺοΈ Customer details
βͺοΈ Call Detail Records (CDRs)
βͺοΈ Customer balance information
βͺοΈ Customer and employee email addresses
βͺοΈ Phone numbers
βͺοΈ Passwords
βͺοΈ Massive PII
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β
β£ Threat Actor: Fronx
β£ Category: Data Sale
β£ Victim: IUNGO Cloud
β£ Industry: Cloud Telephony / SaaS Communications
β
IUNGO provides cloud-based telephony services including hosted PBX, virtual extensions (ramais), contact centers, and omnichannel customer contact for SMBs and enterprises in Brazil. The actor is offering the database as a one-time sale.
β
What's in it:
β
βͺοΈ 73 GiB portabilling database
βͺοΈ Customer details
βͺοΈ Call Detail Records (CDRs)
βͺοΈ Customer balance information
βͺοΈ Customer and employee email addresses
βͺοΈ Phone numbers
βͺοΈ Passwords
βͺοΈ Massive PII
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Chat, the last two channels died around 2800 subscribers... Join the backup https://t.me/SliceForLifeeee
Telegram
πͺ Slice For Life - Part 3 πͺ
Main: t.me/SliceForLifeee
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
β€5
Cyberattack News Alert
βββββββββββββββββββββββββ
Victim: San Diego Community College District
Domain:
Country: πΊπΈ US
Date: May 4th, 2026
Summary:
The San Diego Community College District is currently facing a major cyberattack that began on Saturday, causing certain digital services such as email and enrollment platforms to go offline. Although all campuses remain open and the majority of classes continue, some ancillary operations are affected. The district states that despite the incident, no data has been compromised and is maintaining communication with students via various platforms.
Source: https://www.sandiegouniontribune.com/2026/05/04/san-diego-community-college-district-fighting-major-cyber-attack/
βββββββββββββββββββββββββ
Victim: San Diego Community College District
Domain:
sdccd.eduCountry: πΊπΈ US
Date: May 4th, 2026
Summary:
The San Diego Community College District is currently facing a major cyberattack that began on Saturday, causing certain digital services such as email and enrollment platforms to go offline. Although all campuses remain open and the majority of classes continue, some ancillary operations are affected. The district states that despite the incident, no data has been compromised and is maintaining communication with students via various platforms.
Source: https://www.sandiegouniontribune.com/2026/05/04/san-diego-community-college-district-fighting-major-cyber-attack/
San Diego Union-Tribune
San Diego Community College District fighting major cyberattack
The systemβs four college are still open, but some digital services have been disrupted.