🔪 Slice For Life - Part 2 🔪
3.2K subscribers
718 photos
19 videos
527 links
Download Telegram
🔪 Slice For Life - Part 2 🔪 pinned «I am currently building the historical feed... both the platform frontend and the API endpoints that will get everything first. You still may see some very old posts on the current feed for testing. Currently the threat feed alone is doing over 400 posts…»
‼️ SAFEPAY Ransomware Claims 9 Victims

🇺🇸 jmige.com
🇺🇸 gingerichtrucking.com
🇪🇸 smp.cat
🇮🇹 soavegel.it
🇬🇧 globalmerchservices.com
🇮🇹 studioubertazzi.it
🇧🇪 ettp.be
🇩🇪 mbk-gmbh.de
🇩🇪 id-s.de
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇫🇷 NRJ Mobile allegedly leaked exposing 266K customer records from the French MVNO

A threat actor claims to have leaked a database from NRJ Mobile (nrjmobile.fr), a French mobile virtual network operator, releasing it for free under the hashtag #freebreach3d. The 266,345-record sample includes full customer profiles with banking identifiers (IBAN/BIC) and Freebox account references in JSONL format.

Post details:

▸ Actor(s): NormalLeVrai
▸ Sector: Telecommunications (MVNO)
▸ Type: Data Leak
▸ Format: JSONL
▸ Price: Free
▸ Records: 266,345
▸ Country: France

Compromised data:

▪️ Internal ID and customer code
▪️ Title, first name, last name
▪️ Email address
▪️ Phone numbers (primary and secondary)
▪️ Street address, postal code, city, country
▪️ Individual type
▪️ IBAN and BIC banking identifiers
▪️ Freebox ID
▪️ Account status (active/inactive)
▪️ Registration date
▪️ Retention offer flag and additional mobile loan flag
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇧🇷 TransmiteNota allegedly leaked exposing 20 million records from the Brazilian e-invoicing platform

A forum moderator claims to have leaked a SQL database from app3.transmitenota.com.br, a Brazilian electronic invoicing service, with the dump dated May 1, 2026. The leak reportedly contains 20,151,364 rows and 141,000 emails, with samples showing personal and corporate contact records including individual names and registered businesses.

Post details:

▸ Actor(s): Tanaka
▸ Sector: Finance / SaaS (e-invoicing / nota fiscal)
▸ Type: Data Leak
▸ Format: SQL
▸ Price: Free (reply-gated)
▸ Records: 20,151,364 rows, 141,000 emails
▸ Country: Brazil
▸ Original leak date: 01/05/2026

Compromised data:

▪️ Record ID
▪️ Full names (individuals)
▪️ Company names (LTDA / corporate registrations)
▪️ Phone numbers
▪️ Email addresses
▪️ Internal system reference codes
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇫🇷 Leroy Merlin France allegedly leaked exposing 367,462 loyalty program records

A threat actor claims to be selling a freshly scraped database from Leroy Merlin France, clarifying that it is not a full store dump but rather a dump from one of the retailer's loyalty ("outil de fidelité") tools, and is being marketed as premium, unprocessed, and not previously circulated. The package contains a single file with detailed customer profiles including loyalty card data, addresses, and account metadata.

Post details:

▸ Actor(s): Lagui
▸ Sector: Retail (home improvement)
▸ Type: Data Sale
▸ Format: 1 file (JSON), 367,462 entries
▸ Price: Negotiable (escrow accepted)
▸ Records: 367,462
▸ Country: France
▸ Date: 06/05/2026

Compromised data:

▪️ Internal ID, login, civility, birth date
▪️ First name and last name
▪️ Email addresses (primary and login)
▪️ Phone numbers
▪️ Multiple addresses (building, street number, street, city, postal code, country, province)
▪️ Loyalty card number and barcode
▪️ Loyalty status, points, expiration, validity dates
▪️ Reward and burn status, vouchers, badges
▪️ Co-owners and partner platform access flags
▪️ Web account status, last login, login count
▪️ Marital status, number of children, store code
▪️ Account creation date and migration state
▪️ Administrative identifiers and moving date
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Systemd Backdoor: A simple script to automate systemd backdoor

GitHub: https://github.com/MatheuZSecurity/systemd-backdoor/
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
😈1
Typical Dread ad.
😁2😭1
Guy says he had to burn his main identity and in the first couple sentences says he has bitcoin. 😭

Dread: http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad[.]onion/post/a21d99d556fc7e46c981
😭1
Pavel Durov, founder of Telegram, posted this video in regards to TON's finality time.

I'll take Monero at 20 minutes and beyond any day.
2