πŸ”ͺ Slice For Life - Part 2 πŸ”ͺ
3.07K subscribers
656 photos
15 videos
462 links
Download Telegram
‼️ A threat actor is selling a private cloud-hosted collection of stealer logs totaling 988.7 GB across more than 10,080 files in URL:Login:Password format.

The data is hosted on an external domain and marketed as "exclusive."

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
I'm *considering* making a wall of shame or hall of shame page, because why not.
❀1
β€ΌοΈπŸ‡ΊπŸ‡Έ 313 Team is claiming to target Spotify
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Note: This a repost from the leak by threat actor "breach3d." This actor is asking for a $20,000 ransom. It is not verified if anything in this leak differs from the previous leak in April.

β€ΌοΈπŸ‡«πŸ‡· Agence Nationale des Titres SΓ©curisΓ©s allegedly breached exposing 13 million records from the French national secure documents agency under "Pay Or Leak" ransom

A threat actor claims to have obtained 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s (ANTS), the French government agency that allows citizens to complete online procedures for identity cards, passports, driving licences, and vehicle registration certificates.

The actor has issued a "Pay Or Leak" ultimatum, demanding a ransom of $20,000 (described as negotiable) by May 18, 2026, and threatening to release all of the data to everyone for free if the deadline is not met.

The actor frames the operation as a continuation of recent activity (referencing an earlier release tied to Iran's nuclear program) and presents it as retaliation against efforts to arrest an associate, posting under the tags #PwnerSec, #NormalLeVrai, and #freebreachd.

Post details:

β–Έ Actor(s): NormalLeVrai
β–Έ Sector: Government / Civil Documents
β–Έ Type: Ransom / Pre-Leak Extortion
β–Έ Format: Not specified
β–Έ Price: $20,000 (negotiable, ransom) / Free if unpaid by deadline
β–Έ Records: 13,000,000
β–Έ Country: France
β–Έ Deadline: 18/05/2026
β–Έ Date: 11/05/2026

Compromised data:

β–ͺ️ Approximately 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s online procedures platform
β–ͺ️ Data tied to identity card applications
β–ͺ️ Data tied to passport applications
β–ͺ️ Data tied to driving licence applications
β–ͺ️ Data tied to vehicle registration certificate applications
β–ͺ️ Sample data shared in the post (redacted in screenshots) and an additional pastebin link with further samples
β–ͺ️ Specific field structure not disclosed publicly in the post

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❀1
‼️OHNO allegedly breached exposing Telegram user IDs, crypto wallets, and private keys from the on-chain trading automation platform

A threat actor claims to have leaked sensitive user data from OHNO, a crypto trading automation project that provides a Telegram-based bot designed to simplify and automate on-chain trading. The platform allows users to interact with advanced trading features directly through Telegram, enabling automated strategies and easier access to blockchain markets without requiring complex technical setups.

The actor frames the release as retaliation, stating "next time just pay the ransom instead of having your users pay for you," suggesting OHNO had previously refused an extortion attempt.

Post details:

β–Έ Actor(s): ragnarok
β–Έ Sector: Cryptocurrency / Trading Automation
β–Έ Type: Data Leak (post-failed-ransom retaliation)
β–Έ Format: Not specified
β–Έ Price: Free
β–Έ Records: Not disclosed
β–Έ Country: Not specified
β–Έ Date: 11/05/2026

Compromised data:

β–ͺ️ Telegram user IDs (telegram_USER_ID)
β–ͺ️ IP addresses
β–ͺ️ Crypto wallets
β–ͺ️ Private keys
β–ͺ️ Transactions
β–ͺ️ Session secrets

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡¬πŸ‡§ AIM Smarter allegedly breached exposing 6,500+ business records from the UK promotional products and marketing distribution group

A threat actor claims that on or about May 11th 2026, AIM Smarter, a UK-based marketing distribution and promotional products group, suffered a data breach resulting in the exposure of approximately 6,500+ rows of data containing comprehensive business and financial information, along with internal login credentials.

The actor states the affected dataset includes information tied to financial institutions such as Bank of Scotland, HBOS, and Halifax, as well as energy companies, insurance providers, media firms, and various service organizations across the UK and international locations.

Post details:

β–Έ Actor(s): Shinigami
β–Έ Sector: Marketing / Promotional Products / B2B Services
β–Έ Type: Data Breach
β–Έ Format: Structured relational database / SQL tables
β–Έ Price: Free
β–Έ Records: 6,500+
β–Έ Country: United Kingdom
β–Έ Date: 11/05/2026

Compromised data:

Identity Information:
β–ͺ️ Customer names
β–ͺ️ Company names
β–ͺ️ Short codes
β–ͺ️ Unique reference numbers

Contact Details:
β–ͺ️ Trading addresses (multiple address fields)
β–ͺ️ Postal codes
β–ͺ️ Phone numbers
β–ͺ️ Fax numbers
β–ͺ️ Email addresses
β–ͺ️ Website URLs

Financial Records:
β–ͺ️ Credit limits
β–ͺ️ Credit review dates
β–ͺ️ Invoice age limits
β–ͺ️ Payment methods
β–ͺ️ VAT registration numbers

Business Classification:
β–ͺ️ Industry types
β–ͺ️ SIC codes
β–ͺ️ Company registration numbers
β–ͺ️ DUNS numbers
β–ͺ️ Employee counts

Operational Data:
β–ͺ️ Date opened
β–ͺ️ Date amended
β–ͺ️ Payment methods
β–ͺ️ Currency codes
β–ͺ️ Promotional budgets

System / Technical Data:
β–ͺ️ Record IDs
β–ͺ️ Legacy system codes
β–ͺ️ Division codes
β–ͺ️ Source codes

Internal Logins:
β–ͺ️ Employee emails
β–ͺ️ Employee names
β–ͺ️ MD5 password hashes

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ DOJ Press Release
━━━━━━━━━━━━━━━━━━━━━

New York-Based Iranian National Pleads Guilty to Alien Smuggling and Receiving Child Sexual Abuse Material

Full Press Release β†’ justice.gov

━━━━━━━━━━━━━━━━━━━━━
πŸ•΅οΈ Dark Web Informer β€’ DOJ Monitor

Note: DOJ articles that are not Cyber related will be removed manually.
β€ΌοΈπŸ‡ΊπŸ‡Έ The Gravity Group has been claimed a victim to Qilin Ransomware

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πŸ‡ͺπŸ‡Ί Europol Press Release
━━━━━━━━━━━━━━━━━━━━━

Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted

Full Press Release β†’ europol.europa.eu

━━━━━━━━━━━━━━━━━━━━━
πŸ•΅οΈ Dark Web Informer β€’ Europol Monitor

Note: Europol articles that are not Cyber related will be removed manually.
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━

Victim: Boyne City
Domain: boynecity.gov

Country: πŸ‡ΊπŸ‡Έ US
Date: May 12th, 2026

Summary:
The city of Boyne City, Michigan, is investigating a limited cybersecurity incident that affected portions of its computer network and digital systems. Authorities have confirmed that emergency and critical infrastructure were not impacted; however, the full extent of the disruption to municipal services remains unknown. The investigation is ongoing to determine whether any data has been compromised and which systems have been affected.

Source: https://dysruptionhub.com/boyne-city-cybersecurity-incident/
β€ΌοΈπŸ‡ΊπŸ‡¦ SMIDA allegedly breached: 327,000 credentials exposed from the Ukrainian Stock Market Infrastructure Development Agency

A threat actor is selling user credentials from SMIDA, Ukraine's official public disclosure platform for issuer companies, citing weak password security.

β–Έ Actor: whoare
β–Έ Sector: Government / Financial Markets
β–Έ Type: Data Sale
β–Έ Records: 327,000
β–Έ Country: Ukraine
β–Έ Date: 11/05/2026

Compromised data:
β–ͺ️ User ID
β–ͺ️ Login / username
β–ͺ️ Hashed password
β–ͺ️ Name and email
β–ͺ️ Account creation, update, last login timestamps
β–ͺ️ Active status flag
β–ͺ️ Authentication token

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡»πŸ‡ͺ Consorcio Credicard allegedly breached: 5,000,000+ records exposed from the Venezuelan credit card processing consortium

A threat actor is offering a 5,000,000+ record database from Consorcio Credicard, a Venezuelan credit card processing consortium headquartered in Caracas, founded in 1988, with approximately 1,000+ employees, supporting Visa, Mastercard, and American Express transactions across Venezuela. The leak reportedly includes user accounts, business records, and customer profiles tied to Venezuelan citizens and merchants.

β–Έ Actor: MDGhost (The BlackH4t MD-Ghost)
β–Έ Sector: Financial Services / Payment Processing
β–Έ Type: Data Sale
β–Έ Records: 5,000,000+
β–Έ Country: Venezuela
β–Έ Date: 11/05/2026

Compromised data:
β–ͺ️ User ID, email, account attributes, status flags
β–ͺ️ Created by, last modified by, creation date, last modification date, last login
β–ͺ️ DNI (Venezuelan national ID), full name (first and last)
β–ͺ️ Phone numbers (home and mobile)
β–ͺ️ Full street address (street, number, parroquia, municipio, estado)
β–ͺ️ Account numbers tied to financial accounts
β–ͺ️ Nationality, occupation, civil status
β–ͺ️ Business records including bank ID, gestiΓ³n, apartir_venta, planilla_affi, vta_c_autorizacion, corrective, instalacion flags
β–ͺ️ Mercantile registry information (RIF, business name, registry details)
β–ͺ️ Customer profile records with primary and secondary email addresses
β–ͺ️ Linked forms, profile IDs, and terms/conditions acceptance data
β–ͺ️ Document references (REGISTRO MERCANTIL entries)

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations