βΌοΈ A threat actor is selling a private cloud-hosted collection of stealer logs totaling 988.7 GB across more than 10,080 files in URL:Login:Password format.
The data is hosted on an external domain and marketed as "exclusive."
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
The data is hosted on an external domain and marketed as "exclusive."
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
I'm *considering* making a wall of shame or hall of shame page, because why not.
β€1
βΌοΈ New Dark Web Informer Blog Post!
Title: FutureShop Egypt Allegedly Breached Exposing Thousands of Customer, Order, and Delivery Records From the Egyptian Grocery Delivery Platform
Link: https://darkwebinformer.com/futureshop-egypt-allegedly-breached-exposing-thousands-of-customer-order-and-delivery-records-from-the-egyptian-grocery-delivery-platform/
Title: FutureShop Egypt Allegedly Breached Exposing Thousands of Customer, Order, and Delivery Records From the Egyptian Grocery Delivery Platform
Link: https://darkwebinformer.com/futureshop-egypt-allegedly-breached-exposing-thousands-of-customer-order-and-delivery-records-from-the-egyptian-grocery-delivery-platform/
Dark Web Informer
FutureShop Egypt Allegedly Breached Exposing Thousands of Customer, Order, and Delivery Records From the Egyptian Grocery Deliveryβ¦
A threat actor claims to have breached FutureShop Egypt, an Egyptian grocery delivery platform, by exploiting an entirely exposed API that required no authentication.
βΌοΈπΊπΈ 313 Team is claiming to target Spotify
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πͺ Slice For Life - Part 2 πͺ
βΌοΈ Nightmare-Eclipse has just released two new GitHub repositories... Same user behind RedSun, UnDefend, BlueHammer YellowKey: Bitlocker Bypass Vulnerability https://github.com/Nightmare-Eclipse/YellowKey GreenPlasma: Windows CTFMON Arbitrary Section Creationβ¦
PGP Signed message and the repos now have information:
https://deadeclipse666.blogspot.com/2026/05/two-more-public-disclosures-it-will.html
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
https://deadeclipse666.blogspot.com/2026/05/two-more-public-disclosures-it-will.html
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πͺ Slice For Life - Part 2 πͺ
PGP Signed message and the repos now have information: https://deadeclipse666.blogspot.com/2026/05/two-more-public-disclosures-it-will.html ________________________________________ Main Channel: https://t.me/SliceForLifeee Backup Channel: https://t.me/SliceForLifeeeeβ¦
Credit: @ChaoticEclipse0 (X)
Note: This a repost from the leak by threat actor "breach3d." This actor is asking for a $20,000 ransom. It is not verified if anything in this leak differs from the previous leak in April.
βΌοΈπ«π· Agence Nationale des Titres SΓ©curisΓ©s allegedly breached exposing 13 million records from the French national secure documents agency under "Pay Or Leak" ransom
A threat actor claims to have obtained 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s (ANTS), the French government agency that allows citizens to complete online procedures for identity cards, passports, driving licences, and vehicle registration certificates.
The actor has issued a "Pay Or Leak" ultimatum, demanding a ransom of $20,000 (described as negotiable) by May 18, 2026, and threatening to release all of the data to everyone for free if the deadline is not met.
The actor frames the operation as a continuation of recent activity (referencing an earlier release tied to Iran's nuclear program) and presents it as retaliation against efforts to arrest an associate, posting under the tags #PwnerSec, #NormalLeVrai, and #freebreachd.
Post details:
βΈ Actor(s): NormalLeVrai
βΈ Sector: Government / Civil Documents
βΈ Type: Ransom / Pre-Leak Extortion
βΈ Format: Not specified
βΈ Price: $20,000 (negotiable, ransom) / Free if unpaid by deadline
βΈ Records: 13,000,000
βΈ Country: France
βΈ Deadline: 18/05/2026
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ Approximately 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s online procedures platform
βͺοΈ Data tied to identity card applications
βͺοΈ Data tied to passport applications
βͺοΈ Data tied to driving licence applications
βͺοΈ Data tied to vehicle registration certificate applications
βͺοΈ Sample data shared in the post (redacted in screenshots) and an additional pastebin link with further samples
βͺοΈ Specific field structure not disclosed publicly in the post
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπ«π· Agence Nationale des Titres SΓ©curisΓ©s allegedly breached exposing 13 million records from the French national secure documents agency under "Pay Or Leak" ransom
A threat actor claims to have obtained 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s (ANTS), the French government agency that allows citizens to complete online procedures for identity cards, passports, driving licences, and vehicle registration certificates.
The actor has issued a "Pay Or Leak" ultimatum, demanding a ransom of $20,000 (described as negotiable) by May 18, 2026, and threatening to release all of the data to everyone for free if the deadline is not met.
The actor frames the operation as a continuation of recent activity (referencing an earlier release tied to Iran's nuclear program) and presents it as retaliation against efforts to arrest an associate, posting under the tags #PwnerSec, #NormalLeVrai, and #freebreachd.
Post details:
βΈ Actor(s): NormalLeVrai
βΈ Sector: Government / Civil Documents
βΈ Type: Ransom / Pre-Leak Extortion
βΈ Format: Not specified
βΈ Price: $20,000 (negotiable, ransom) / Free if unpaid by deadline
βΈ Records: 13,000,000
βΈ Country: France
βΈ Deadline: 18/05/2026
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ Approximately 13 million records from the Agence Nationale des Titres SΓ©curisΓ©s online procedures platform
βͺοΈ Data tied to identity card applications
βͺοΈ Data tied to passport applications
βͺοΈ Data tied to driving licence applications
βͺοΈ Data tied to vehicle registration certificate applications
βͺοΈ Sample data shared in the post (redacted in screenshots) and an additional pastebin link with further samples
βͺοΈ Specific field structure not disclosed publicly in the post
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€1
βΌοΈOHNO allegedly breached exposing Telegram user IDs, crypto wallets, and private keys from the on-chain trading automation platform
A threat actor claims to have leaked sensitive user data from OHNO, a crypto trading automation project that provides a Telegram-based bot designed to simplify and automate on-chain trading. The platform allows users to interact with advanced trading features directly through Telegram, enabling automated strategies and easier access to blockchain markets without requiring complex technical setups.
The actor frames the release as retaliation, stating "next time just pay the ransom instead of having your users pay for you," suggesting OHNO had previously refused an extortion attempt.
Post details:
βΈ Actor(s): ragnarok
βΈ Sector: Cryptocurrency / Trading Automation
βΈ Type: Data Leak (post-failed-ransom retaliation)
βΈ Format: Not specified
βΈ Price: Free
βΈ Records: Not disclosed
βΈ Country: Not specified
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ Telegram user IDs (telegram_USER_ID)
βͺοΈ IP addresses
βͺοΈ Crypto wallets
βͺοΈ Private keys
βͺοΈ Transactions
βͺοΈ Session secrets
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked sensitive user data from OHNO, a crypto trading automation project that provides a Telegram-based bot designed to simplify and automate on-chain trading. The platform allows users to interact with advanced trading features directly through Telegram, enabling automated strategies and easier access to blockchain markets without requiring complex technical setups.
The actor frames the release as retaliation, stating "next time just pay the ransom instead of having your users pay for you," suggesting OHNO had previously refused an extortion attempt.
Post details:
βΈ Actor(s): ragnarok
βΈ Sector: Cryptocurrency / Trading Automation
βΈ Type: Data Leak (post-failed-ransom retaliation)
βΈ Format: Not specified
βΈ Price: Free
βΈ Records: Not disclosed
βΈ Country: Not specified
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ Telegram user IDs (telegram_USER_ID)
βͺοΈ IP addresses
βͺοΈ Crypto wallets
βͺοΈ Private keys
βͺοΈ Transactions
βͺοΈ Session secrets
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπ¬π§ AIM Smarter allegedly breached exposing 6,500+ business records from the UK promotional products and marketing distribution group
A threat actor claims that on or about May 11th 2026, AIM Smarter, a UK-based marketing distribution and promotional products group, suffered a data breach resulting in the exposure of approximately 6,500+ rows of data containing comprehensive business and financial information, along with internal login credentials.
The actor states the affected dataset includes information tied to financial institutions such as Bank of Scotland, HBOS, and Halifax, as well as energy companies, insurance providers, media firms, and various service organizations across the UK and international locations.
Post details:
βΈ Actor(s): Shinigami
βΈ Sector: Marketing / Promotional Products / B2B Services
βΈ Type: Data Breach
βΈ Format: Structured relational database / SQL tables
βΈ Price: Free
βΈ Records: 6,500+
βΈ Country: United Kingdom
βΈ Date: 11/05/2026
Compromised data:
Identity Information:
βͺοΈ Customer names
βͺοΈ Company names
βͺοΈ Short codes
βͺοΈ Unique reference numbers
Contact Details:
βͺοΈ Trading addresses (multiple address fields)
βͺοΈ Postal codes
βͺοΈ Phone numbers
βͺοΈ Fax numbers
βͺοΈ Email addresses
βͺοΈ Website URLs
Financial Records:
βͺοΈ Credit limits
βͺοΈ Credit review dates
βͺοΈ Invoice age limits
βͺοΈ Payment methods
βͺοΈ VAT registration numbers
Business Classification:
βͺοΈ Industry types
βͺοΈ SIC codes
βͺοΈ Company registration numbers
βͺοΈ DUNS numbers
βͺοΈ Employee counts
Operational Data:
βͺοΈ Date opened
βͺοΈ Date amended
βͺοΈ Payment methods
βͺοΈ Currency codes
βͺοΈ Promotional budgets
System / Technical Data:
βͺοΈ Record IDs
βͺοΈ Legacy system codes
βͺοΈ Division codes
βͺοΈ Source codes
Internal Logins:
βͺοΈ Employee emails
βͺοΈ Employee names
βͺοΈ MD5 password hashes
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims that on or about May 11th 2026, AIM Smarter, a UK-based marketing distribution and promotional products group, suffered a data breach resulting in the exposure of approximately 6,500+ rows of data containing comprehensive business and financial information, along with internal login credentials.
The actor states the affected dataset includes information tied to financial institutions such as Bank of Scotland, HBOS, and Halifax, as well as energy companies, insurance providers, media firms, and various service organizations across the UK and international locations.
Post details:
βΈ Actor(s): Shinigami
βΈ Sector: Marketing / Promotional Products / B2B Services
βΈ Type: Data Breach
βΈ Format: Structured relational database / SQL tables
βΈ Price: Free
βΈ Records: 6,500+
βΈ Country: United Kingdom
βΈ Date: 11/05/2026
Compromised data:
Identity Information:
βͺοΈ Customer names
βͺοΈ Company names
βͺοΈ Short codes
βͺοΈ Unique reference numbers
Contact Details:
βͺοΈ Trading addresses (multiple address fields)
βͺοΈ Postal codes
βͺοΈ Phone numbers
βͺοΈ Fax numbers
βͺοΈ Email addresses
βͺοΈ Website URLs
Financial Records:
βͺοΈ Credit limits
βͺοΈ Credit review dates
βͺοΈ Invoice age limits
βͺοΈ Payment methods
βͺοΈ VAT registration numbers
Business Classification:
βͺοΈ Industry types
βͺοΈ SIC codes
βͺοΈ Company registration numbers
βͺοΈ DUNS numbers
βͺοΈ Employee counts
Operational Data:
βͺοΈ Date opened
βͺοΈ Date amended
βͺοΈ Payment methods
βͺοΈ Currency codes
βͺοΈ Promotional budgets
System / Technical Data:
βͺοΈ Record IDs
βͺοΈ Legacy system codes
βͺοΈ Division codes
βͺοΈ Source codes
Internal Logins:
βͺοΈ Employee emails
βͺοΈ Employee names
βͺοΈ MD5 password hashes
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ DOJ Press Release
βββββββββββββββββββββ
New York-Based Iranian National Pleads Guilty to Alien Smuggling and Receiving Child Sexual Abuse Material
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
New York-Based Iranian National Pleads Guilty to Alien Smuggling and Receiving Child Sexual Abuse Material
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
New York-Based Iranian National Pleads Guilty to Alien Smuggling and
Earlier today in federal court in Brooklyn, Iranian national Sharon Gohari pleaded guilty to unlawfully smuggling aliens into the United States and intentionally receiving child sexual abuse material (CSAM).
βΌοΈ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 12th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-12th-2026/
Title: Daily Dose of Dark Web Informer - May 12th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-12th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 12th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
βΌοΈπΊπΈ The Gravity Group has been claimed a victim to Qilin Ransomware
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πͺπΊ Europol Press Release
βββββββββββββββββββββ
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
Europol
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted | Europol
One of the Swedish fugitives recently featured on the EU Most Wanted website as part of Operational Taskforce (OTF) GRIMM has been arrested in Tunisia. At the same time, two additional high-value targets linked to violence-as-a-service criminal networks haveβ¦
Cyberattack News Alert
βββββββββββββββββββββββββ
Victim: Boyne City
Domain:
Country: πΊπΈ US
Date: May 12th, 2026
Summary:
The city of Boyne City, Michigan, is investigating a limited cybersecurity incident that affected portions of its computer network and digital systems. Authorities have confirmed that emergency and critical infrastructure were not impacted; however, the full extent of the disruption to municipal services remains unknown. The investigation is ongoing to determine whether any data has been compromised and which systems have been affected.
Source: https://dysruptionhub.com/boyne-city-cybersecurity-incident/
βββββββββββββββββββββββββ
Victim: Boyne City
Domain:
boynecity.govCountry: πΊπΈ US
Date: May 12th, 2026
Summary:
The city of Boyne City, Michigan, is investigating a limited cybersecurity incident that affected portions of its computer network and digital systems. Authorities have confirmed that emergency and critical infrastructure were not impacted; however, the full extent of the disruption to municipal services remains unknown. The investigation is ongoing to determine whether any data has been compromised and which systems have been affected.
Source: https://dysruptionhub.com/boyne-city-cybersecurity-incident/
DysruptionHub
Boyne City, Michigan, probes limited cybersecurity incident
Boyne City, Michigan, is investigating a limited cybersecurity incident affecting parts of its network and digital systems.
βΌοΈπΊπ¦ SMIDA allegedly breached: 327,000 credentials exposed from the Ukrainian Stock Market Infrastructure Development Agency
A threat actor is selling user credentials from SMIDA, Ukraine's official public disclosure platform for issuer companies, citing weak password security.
βΈ Actor: whoare
βΈ Sector: Government / Financial Markets
βΈ Type: Data Sale
βΈ Records: 327,000
βΈ Country: Ukraine
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID
βͺοΈ Login / username
βͺοΈ Hashed password
βͺοΈ Name and email
βͺοΈ Account creation, update, last login timestamps
βͺοΈ Active status flag
βͺοΈ Authentication token
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor is selling user credentials from SMIDA, Ukraine's official public disclosure platform for issuer companies, citing weak password security.
βΈ Actor: whoare
βΈ Sector: Government / Financial Markets
βΈ Type: Data Sale
βΈ Records: 327,000
βΈ Country: Ukraine
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID
βͺοΈ Login / username
βͺοΈ Hashed password
βͺοΈ Name and email
βͺοΈ Account creation, update, last login timestamps
βͺοΈ Active status flag
βͺοΈ Authentication token
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπ»πͺ Consorcio Credicard allegedly breached: 5,000,000+ records exposed from the Venezuelan credit card processing consortium
A threat actor is offering a 5,000,000+ record database from Consorcio Credicard, a Venezuelan credit card processing consortium headquartered in Caracas, founded in 1988, with approximately 1,000+ employees, supporting Visa, Mastercard, and American Express transactions across Venezuela. The leak reportedly includes user accounts, business records, and customer profiles tied to Venezuelan citizens and merchants.
βΈ Actor: MDGhost (The BlackH4t MD-Ghost)
βΈ Sector: Financial Services / Payment Processing
βΈ Type: Data Sale
βΈ Records: 5,000,000+
βΈ Country: Venezuela
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID, email, account attributes, status flags
βͺοΈ Created by, last modified by, creation date, last modification date, last login
βͺοΈ DNI (Venezuelan national ID), full name (first and last)
βͺοΈ Phone numbers (home and mobile)
βͺοΈ Full street address (street, number, parroquia, municipio, estado)
βͺοΈ Account numbers tied to financial accounts
βͺοΈ Nationality, occupation, civil status
βͺοΈ Business records including bank ID, gestiΓ³n, apartir_venta, planilla_affi, vta_c_autorizacion, corrective, instalacion flags
βͺοΈ Mercantile registry information (RIF, business name, registry details)
βͺοΈ Customer profile records with primary and secondary email addresses
βͺοΈ Linked forms, profile IDs, and terms/conditions acceptance data
βͺοΈ Document references (REGISTRO MERCANTIL entries)
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor is offering a 5,000,000+ record database from Consorcio Credicard, a Venezuelan credit card processing consortium headquartered in Caracas, founded in 1988, with approximately 1,000+ employees, supporting Visa, Mastercard, and American Express transactions across Venezuela. The leak reportedly includes user accounts, business records, and customer profiles tied to Venezuelan citizens and merchants.
βΈ Actor: MDGhost (The BlackH4t MD-Ghost)
βΈ Sector: Financial Services / Payment Processing
βΈ Type: Data Sale
βΈ Records: 5,000,000+
βΈ Country: Venezuela
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID, email, account attributes, status flags
βͺοΈ Created by, last modified by, creation date, last modification date, last login
βͺοΈ DNI (Venezuelan national ID), full name (first and last)
βͺοΈ Phone numbers (home and mobile)
βͺοΈ Full street address (street, number, parroquia, municipio, estado)
βͺοΈ Account numbers tied to financial accounts
βͺοΈ Nationality, occupation, civil status
βͺοΈ Business records including bank ID, gestiΓ³n, apartir_venta, planilla_affi, vta_c_autorizacion, corrective, instalacion flags
βͺοΈ Mercantile registry information (RIF, business name, registry details)
βͺοΈ Customer profile records with primary and secondary email addresses
βͺοΈ Linked forms, profile IDs, and terms/conditions acceptance data
βͺοΈ Document references (REGISTRO MERCANTIL entries)
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations