‼️🇮🇩 Indonesian Ministry of Transportation (Dishub) allegedly breached exposing 93GB+ of vehicle and owner records
A threat actor claims to have a 93GB+ database from Dishub (dishub.go.id), tied to Indonesia's Kementerian Perhubungan, covering 38 provinces and 514 cities/regencies. The seller is asking $8,500 and explicitly opens the door to extortion by saying they are "open to negotiations to delete the database," with samples showing hundreds of thousands of vehicle and owner records concentrated in the Jakarta capital region.
Post details:
▸ Actor(s): Kyyzo
▸ Sector: Government / Transportation regulator
▸ Type: Data Sale (with deletion-fee extortion offered)
▸ Format: SQL records
▸ Price: $8,500 (open to "pay or sell" negotiation)
▸ Volume: 93GB+
▸ Coverage: 38 provinces, 514 cities/regencies
▸ Country: Indonesia
▸ Date: 10/05/2026
Compromised data:
▪️ Vehicle ID (id_kendaraan)
▪️ Owner full name (nama_pemilik)
▪️ License plate (nopol)
▪️ Account password
▪️ Route ID and route number (id_trayek, no_trayek)
▪️ Vehicle type (tipe_mobil) and brand/model (Suzuki, Daihatsu, Mitsubishi, etc.)
▪️ Year of manufacture (tahun_perakitan)
▪️ Body/category code (bbm, no_uji)
▪️ Chassis and engine numbers
▪️ Registration / inspection dates
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have a 93GB+ database from Dishub (dishub.go.id), tied to Indonesia's Kementerian Perhubungan, covering 38 provinces and 514 cities/regencies. The seller is asking $8,500 and explicitly opens the door to extortion by saying they are "open to negotiations to delete the database," with samples showing hundreds of thousands of vehicle and owner records concentrated in the Jakarta capital region.
Post details:
▸ Actor(s): Kyyzo
▸ Sector: Government / Transportation regulator
▸ Type: Data Sale (with deletion-fee extortion offered)
▸ Format: SQL records
▸ Price: $8,500 (open to "pay or sell" negotiation)
▸ Volume: 93GB+
▸ Coverage: 38 provinces, 514 cities/regencies
▸ Country: Indonesia
▸ Date: 10/05/2026
Compromised data:
▪️ Vehicle ID (id_kendaraan)
▪️ Owner full name (nama_pemilik)
▪️ License plate (nopol)
▪️ Account password
▪️ Route ID and route number (id_trayek, no_trayek)
▪️ Vehicle type (tipe_mobil) and brand/model (Suzuki, Daihatsu, Mitsubishi, etc.)
▪️ Year of manufacture (tahun_perakitan)
▪️ Body/category code (bbm, no_uji)
▪️ Chassis and engine numbers
▪️ Registration / inspection dates
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇧🇩 BADC allegedly breached exposing full private git repo from Bangladesh Agricultural Development Corporation
A threat actor claims to have leaked the full private git repository of Bangladesh Agricultural Development Corporation (BADC), an autonomous government body under the Ministry of Agriculture of Bangladesh. The leak allegedly contains payment gateway configuration credentials, database passwords, and sensitive/confidential documents. The actor also claims to have taken down the portal during the intrusion, preventing administrator logins.
Post details:
▸ Actor(s): vicmeow
▸ Sector: Government / Agriculture
▸ Type: Data Breach / Source Code Leak
▸ Format: Git Repository
▸ Price: Free
▸ Country: Bangladesh
▸ Date: 10/05/2026
Compromised data:
▪️ Full private git repository source code
▪️ Payment gateway configuration credentials (SPG / Sonali Bank)
▪️ SPG API URLs and authorization tokens (Basic auth)
▪️ Payment request and transaction verification endpoints
▪️ Response handler URLs and Codeigniter routes
▪️ Database connection configuration
▪️ Database hostname (TNS name)
▪️ Database username (badc_live_1)
▪️ Database password (synbadc_123)
▪️ Database driver (oci8 / Oracle)
▪️ Environment and debug flags
▪️ Sensitive and confidential internal documents
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked the full private git repository of Bangladesh Agricultural Development Corporation (BADC), an autonomous government body under the Ministry of Agriculture of Bangladesh. The leak allegedly contains payment gateway configuration credentials, database passwords, and sensitive/confidential documents. The actor also claims to have taken down the portal during the intrusion, preventing administrator logins.
Post details:
▸ Actor(s): vicmeow
▸ Sector: Government / Agriculture
▸ Type: Data Breach / Source Code Leak
▸ Format: Git Repository
▸ Price: Free
▸ Country: Bangladesh
▸ Date: 10/05/2026
Compromised data:
▪️ Full private git repository source code
▪️ Payment gateway configuration credentials (SPG / Sonali Bank)
▪️ SPG API URLs and authorization tokens (Basic auth)
▪️ Payment request and transaction verification endpoints
▪️ Response handler URLs and Codeigniter routes
▪️ Database connection configuration
▪️ Database hostname (TNS name)
▪️ Database username (badc_live_1)
▪️ Database password (synbadc_123)
▪️ Database driver (oci8 / Oracle)
▪️ Environment and debug flags
▪️ Sensitive and confidential internal documents
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇳🇬 Oyo State Commerce website allegedly hacked as part of opNigeria
A threat actor claims to have hacked the Oyo State Commerce website, releasing a data leak as part of an ongoing campaign branded opNigeria. The actor frames the operation as a politically motivated protest against the Nigerian government, stating that more leaks will follow. The post advertises the dump as "a simple data leak" with additional releases promised.
Post details:
▸ Actor(s): ki4tane (Nullsec Nigeria)
▸ Sector: Government / E-Commerce
▸ Type: Data Leak / Website Hack
▸ Format: Not specified
▸ Price: Free
▸ Country: Nigeria
▸ Campaign: opNigeria
▸ Date: 10/05/2026
Compromised data:
▪️ MySQL logs
▪️ System logs
▪️ Additional data reportedly forthcoming
Additional notes:
▪️ Actor claims this is an initial release with more leaks to come
▪️ Attributed to "Nullsec Nigeria"
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have hacked the Oyo State Commerce website, releasing a data leak as part of an ongoing campaign branded opNigeria. The actor frames the operation as a politically motivated protest against the Nigerian government, stating that more leaks will follow. The post advertises the dump as "a simple data leak" with additional releases promised.
Post details:
▸ Actor(s): ki4tane (Nullsec Nigeria)
▸ Sector: Government / E-Commerce
▸ Type: Data Leak / Website Hack
▸ Format: Not specified
▸ Price: Free
▸ Country: Nigeria
▸ Campaign: opNigeria
▸ Date: 10/05/2026
Compromised data:
▪️ MySQL logs
▪️ System logs
▪️ Additional data reportedly forthcoming
Additional notes:
▪️ Actor claims this is an initial release with more leaks to come
▪️ Attributed to "Nullsec Nigeria"
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇮🇷 Iran Nuclear allegedly breached with 77.56 GB of data threatened for release under "Pay Or Leak" ransom
A threat actor claims to have obtained 77.56 GB of data related to Iran, including archives tied to the Iranian nuclear program, government databases, and a nuclear authority website. The actor has issued a "Pay Or Leak" ultimatum, demanding €5,000 by May 15th and threatening to publicly release all collected information if the ransom is not paid. The actor frames the operation as a response to events involving Israel and Iran, and claims to have also defaced Iranian websites and exfiltrated their databases during the intrusion.
Post details:
▸ Actor(s): NormalLeVrai
▸ Sector: Government / Nuclear / Insurance
▸ Type: Ransom / Pre-Leak Extortion
▸ Format: RAR, ZIP, JSON, XLSX, TXT
▸ Price: €5,000 (ransom) / Free if unpaid by deadline
▸ Records: 77.56 GB
▸ Country: Iran
▸ Deadline: 15/05/2026
▸ Date: 10/05/2026
Compromised data:
▪️ Data_Iran_Nuclear_Program - ~1.6 GB per file, archives related to the Iranian nuclear program (multiple files)
▪️ Nuclear Iranian Database.part01–35.rar - database divided into 35 parts, up to ~1.48 GB each
▪️ Iran 4.63GB.json.002 - part of a large structured JSON file
▪️ Iran & RF 95.000.000.zip.001 - ~1.84 GB
▪️ Iran & RF 95.000.000database.zip - additional part of a 95 million record database
▪️ iran_insurances_samples.zip - Iranian insurance data
▪️ IranBudget-Table-07-1-Bill1399.xlsx - Iranian budget table
▪️ Iran 500k.txt - large list of telephone number data
▪️ bapeten.go.id - ~1.47 GB, archive related to Iranian nuclear authority / government website
▪️ Defacement evidence and extracted databases from additional Iranian websites
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have obtained 77.56 GB of data related to Iran, including archives tied to the Iranian nuclear program, government databases, and a nuclear authority website. The actor has issued a "Pay Or Leak" ultimatum, demanding €5,000 by May 15th and threatening to publicly release all collected information if the ransom is not paid. The actor frames the operation as a response to events involving Israel and Iran, and claims to have also defaced Iranian websites and exfiltrated their databases during the intrusion.
Post details:
▸ Actor(s): NormalLeVrai
▸ Sector: Government / Nuclear / Insurance
▸ Type: Ransom / Pre-Leak Extortion
▸ Format: RAR, ZIP, JSON, XLSX, TXT
▸ Price: €5,000 (ransom) / Free if unpaid by deadline
▸ Records: 77.56 GB
▸ Country: Iran
▸ Deadline: 15/05/2026
▸ Date: 10/05/2026
Compromised data:
▪️ Data_Iran_Nuclear_Program - ~1.6 GB per file, archives related to the Iranian nuclear program (multiple files)
▪️ Nuclear Iranian Database.part01–35.rar - database divided into 35 parts, up to ~1.48 GB each
▪️ Iran 4.63GB.json.002 - part of a large structured JSON file
▪️ Iran & RF 95.000.000.zip.001 - ~1.84 GB
▪️ Iran & RF 95.000.000database.zip - additional part of a 95 million record database
▪️ iran_insurances_samples.zip - Iranian insurance data
▪️ IranBudget-Table-07-1-Bill1399.xlsx - Iranian budget table
▪️ Iran 500k.txt - large list of telephone number data
▪️ bapeten.go.id - ~1.47 GB, archive related to Iranian nuclear authority / government website
▪️ Defacement evidence and extracted databases from additional Iranian websites
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤1
"Use a computer. Then make it vanish."
‼️bubbl.cx allegedly advertised as disposable anonymous RDP service for Windows & Linux
A threat actor is promoting bubbl.cx, a service marketed as a disposable cloud desktop platform offering anonymous Windows and Linux RDP access. The service advertises no-email signup, cryptocurrency-only payments, and full destruction of VMs, disks, and keys on termination, branded as "anonymous by design" and aimed at users seeking untraceable remote computing infrastructure.
Post details:
▸ Actor(s): gravem1nd (VIP)
▸ Sector: Anonymous Hosting / Disposable RDP
▸ Type: Service Advertisement
▸ Format: Browser-based RDP + SSH
▸ Country: Multi-region (DE, US, AU)
▸ Date: 10/05/2026
Service features:
▪️ Full Windows or Linux RDP in-browser, deployable in under 60 seconds
▪️ Supported OS: Windows 11, Windows Server 2022, Ubuntu, Debian, Fedora, Parrot
▪️ Regions: Frankfurt, NYC, Sydney
▪️ WireGuard kill switch, all traffic forced through encrypted VPN at firewall level
▪️ No email signup, password-only authentication
▪️ "Pop & Gone" destruction, VM, disk, and keys wiped on termination, advertised as unrecoverable
▪️ LUKS full-disk encryption on NVMe storage at rest
▪️ Browser RDP + SSH access, no client install required
▪️ US and EU exit nodes for traffic routing
▪️ Plans: Micro ($9/mo, 2 vCPU, 4GB RAM, 60GB, 1 Bubble), Standard ($19/mo, 4 vCPU, 8GB RAM, 120GB, 2 Bubbles), Pro ($39/mo, 6 vCPU, 12GB RAM, 180GB, 3 Bubbles)
▪️ Payment: BTC, ETH, XMR, LTC plus 50 more cryptocurrencies
▪️ Slogan: "No logs, no traces, no recovery"
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️bubbl.cx allegedly advertised as disposable anonymous RDP service for Windows & Linux
A threat actor is promoting bubbl.cx, a service marketed as a disposable cloud desktop platform offering anonymous Windows and Linux RDP access. The service advertises no-email signup, cryptocurrency-only payments, and full destruction of VMs, disks, and keys on termination, branded as "anonymous by design" and aimed at users seeking untraceable remote computing infrastructure.
Post details:
▸ Actor(s): gravem1nd (VIP)
▸ Sector: Anonymous Hosting / Disposable RDP
▸ Type: Service Advertisement
▸ Format: Browser-based RDP + SSH
▸ Country: Multi-region (DE, US, AU)
▸ Date: 10/05/2026
Service features:
▪️ Full Windows or Linux RDP in-browser, deployable in under 60 seconds
▪️ Supported OS: Windows 11, Windows Server 2022, Ubuntu, Debian, Fedora, Parrot
▪️ Regions: Frankfurt, NYC, Sydney
▪️ WireGuard kill switch, all traffic forced through encrypted VPN at firewall level
▪️ No email signup, password-only authentication
▪️ "Pop & Gone" destruction, VM, disk, and keys wiped on termination, advertised as unrecoverable
▪️ LUKS full-disk encryption on NVMe storage at rest
▪️ Browser RDP + SSH access, no client install required
▪️ US and EU exit nodes for traffic routing
▪️ Plans: Micro ($9/mo, 2 vCPU, 4GB RAM, 60GB, 1 Bubble), Standard ($19/mo, 4 vCPU, 8GB RAM, 120GB, 2 Bubbles), Pro ($39/mo, 6 vCPU, 12GB RAM, 180GB, 3 Bubbles)
▪️ Payment: BTC, ETH, XMR, LTC plus 50 more cryptocurrencies
▪️ Slogan: "No logs, no traces, no recovery"
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤1🔥1
‼️🇬🇧 LAPSUS$ Group has leaked the data of Vodafone.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Historical feed is coming along. It has its own frontend working. Give it 2-3 weeks and API will have the data and then platform will get it shortly after.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
For those asking how many forums are being monitored by the threat feed: 18... this includes 1 that is down, and 1 that is being onboarded. I have updated the pricing page and API details page to reflect this. There has been 552 alerts on the feed today alone.
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: Direction générale de la Comptabilité publique et du Trésor
Domain:
Country: 🇸🇪 SE
Date: May 10th, 2026
Summary:
La Direction générale de la Comptabilité publique et du Trésor (DGCPT) a annoncé une perturbation de ses systèmes d'information depuis le dimanche 10 mai 2026, suite à un incident non précisé. Cette panne survient quelques mois après une attaque de cyber-extorsion ayant touché la Direction générale des Impôts et des Domaines (DGID). Ces événements s'inscrivent dans un contexte africain marqué par une augmentation des cybermenaces ciblant les institutions publiques.
Source: https://fr.apanews.net/news/senegal-incident-technique-au-tresor-public/
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: Direction générale de la Comptabilité publique et du Trésor
Domain:
sentresor.orgCountry: 🇸🇪 SE
Date: May 10th, 2026
Summary:
La Direction générale de la Comptabilité publique et du Trésor (DGCPT) a annoncé une perturbation de ses systèmes d'information depuis le dimanche 10 mai 2026, suite à un incident non précisé. Cette panne survient quelques mois après une attaque de cyber-extorsion ayant touché la Direction générale des Impôts et des Domaines (DGID). Ces événements s'inscrivent dans un contexte africain marqué par une augmentation des cybermenaces ciblant les institutions publiques.
Source: https://fr.apanews.net/news/senegal-incident-technique-au-tresor-public/
APAnews - Agence de Presse Africaine
Sénégal : le Trésor public signale un incident informatique
La Direction générale de la Comptabilité publique et du Trésor a annoncé lundi une perturbation de ses systèmes d'information, au lendemain d'un week-end. L'incident intervient quelques mois après une attaque informatique attribuée à un groupe de cyber-extorsion…
‼️🇲🇽 Poder Judicial del Estado de Tabasco allegedly leaked exposing 11,741 worker records from the Mexican state judicial body
A threat actor claims to have leaked the database of Poder Judicial del Estado de Tabasco (Órgano de Administración Judicial), the judicial branch of the Mexican state of Tabasco. The actor states that 11,741 workers are exposed due to poor security and frames the release as a hack performed by "hackstage". The CSV sample shows full identity records including government tax IDs, institutional and personal emails, phone numbers, and marital status, with sample entries dating back to 2021.
Post details:
▸ Actor(s): hackstage
▸ Sector: Government / Judicial
▸ Type: Database Leak
▸ Format: CSV
▸ Price: Free
▸ Records: 11,741
▸ Country: Mexico
▸ Date: 10/05/2026
Compromised data:
▪️ ID
▪️ Names (nombres)
▪️ First surname (primer_apellido)
▪️ Second surname (segundo_apellido)
▪️ CURP (Mexican national identity code)
▪️ RFC (Mexican federal taxpayer registry)
▪️ Institutional email (correo_institucional)
▪️ Personal email (correo_personal)
▪️ Home phone (telefono_casa)
▪️ Personal phone (telefono_personal)
▪️ Marital status (estado_civil)
▪️ Matrimonial regime (regimen_matrimonial)
▪️ Country (pais)
▪️ Observations (observaciones)
▪️ Last update field and timestamp (actualizo, f_actualizacion)
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked the database of Poder Judicial del Estado de Tabasco (Órgano de Administración Judicial), the judicial branch of the Mexican state of Tabasco. The actor states that 11,741 workers are exposed due to poor security and frames the release as a hack performed by "hackstage". The CSV sample shows full identity records including government tax IDs, institutional and personal emails, phone numbers, and marital status, with sample entries dating back to 2021.
Post details:
▸ Actor(s): hackstage
▸ Sector: Government / Judicial
▸ Type: Database Leak
▸ Format: CSV
▸ Price: Free
▸ Records: 11,741
▸ Country: Mexico
▸ Date: 10/05/2026
Compromised data:
▪️ ID
▪️ Names (nombres)
▪️ First surname (primer_apellido)
▪️ Second surname (segundo_apellido)
▪️ CURP (Mexican national identity code)
▪️ RFC (Mexican federal taxpayer registry)
▪️ Institutional email (correo_institucional)
▪️ Personal email (correo_personal)
▪️ Home phone (telefono_casa)
▪️ Personal phone (telefono_personal)
▪️ Marital status (estado_civil)
▪️ Matrimonial regime (regimen_matrimonial)
▪️ Country (pais)
▪️ Observations (observaciones)
▪️ Last update field and timestamp (actualizo, f_actualizacion)
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ Possible ShinyHunters clearnet domain seizure as of about 7 hours ago detected by my FBI Watchdog script.
Site is currently down.
Site is currently down.
❤1