βΌοΈ DOJ Press Release
βββββββββββββββββββββ
New York-Based Iranian National Pleads Guilty to Alien Smuggling and Receiving Child Sexual Abuse Material
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
New York-Based Iranian National Pleads Guilty to Alien Smuggling and Receiving Child Sexual Abuse Material
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
New York-Based Iranian National Pleads Guilty to Alien Smuggling and
Earlier today in federal court in Brooklyn, Iranian national Sharon Gohari pleaded guilty to unlawfully smuggling aliens into the United States and intentionally receiving child sexual abuse material (CSAM).
βΌοΈ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 12th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-12th-2026/
Title: Daily Dose of Dark Web Informer - May 12th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-12th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 12th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
βΌοΈπΊπΈ The Gravity Group has been claimed a victim to Qilin Ransomware
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πͺπΊ Europol Press Release
βββββββββββββββββββββ
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted
Full Press Release β europol.europa.eu
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
Europol
Swedish fugitive arrested as new OTF GRIMM targets added to EU Most Wanted | Europol
One of the Swedish fugitives recently featured on the EU Most Wanted website as part of Operational Taskforce (OTF) GRIMM has been arrested in Tunisia. At the same time, two additional high-value targets linked to violence-as-a-service criminal networks haveβ¦
Cyberattack News Alert
βββββββββββββββββββββββββ
Victim: Boyne City
Domain:
Country: πΊπΈ US
Date: May 12th, 2026
Summary:
The city of Boyne City, Michigan, is investigating a limited cybersecurity incident that affected portions of its computer network and digital systems. Authorities have confirmed that emergency and critical infrastructure were not impacted; however, the full extent of the disruption to municipal services remains unknown. The investigation is ongoing to determine whether any data has been compromised and which systems have been affected.
Source: https://dysruptionhub.com/boyne-city-cybersecurity-incident/
βββββββββββββββββββββββββ
Victim: Boyne City
Domain:
boynecity.govCountry: πΊπΈ US
Date: May 12th, 2026
Summary:
The city of Boyne City, Michigan, is investigating a limited cybersecurity incident that affected portions of its computer network and digital systems. Authorities have confirmed that emergency and critical infrastructure were not impacted; however, the full extent of the disruption to municipal services remains unknown. The investigation is ongoing to determine whether any data has been compromised and which systems have been affected.
Source: https://dysruptionhub.com/boyne-city-cybersecurity-incident/
DysruptionHub
Boyne City, Michigan, probes limited cybersecurity incident
Boyne City, Michigan, is investigating a limited cybersecurity incident affecting parts of its network and digital systems.
βΌοΈπΊπ¦ SMIDA allegedly breached: 327,000 credentials exposed from the Ukrainian Stock Market Infrastructure Development Agency
A threat actor is selling user credentials from SMIDA, Ukraine's official public disclosure platform for issuer companies, citing weak password security.
βΈ Actor: whoare
βΈ Sector: Government / Financial Markets
βΈ Type: Data Sale
βΈ Records: 327,000
βΈ Country: Ukraine
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID
βͺοΈ Login / username
βͺοΈ Hashed password
βͺοΈ Name and email
βͺοΈ Account creation, update, last login timestamps
βͺοΈ Active status flag
βͺοΈ Authentication token
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor is selling user credentials from SMIDA, Ukraine's official public disclosure platform for issuer companies, citing weak password security.
βΈ Actor: whoare
βΈ Sector: Government / Financial Markets
βΈ Type: Data Sale
βΈ Records: 327,000
βΈ Country: Ukraine
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID
βͺοΈ Login / username
βͺοΈ Hashed password
βͺοΈ Name and email
βͺοΈ Account creation, update, last login timestamps
βͺοΈ Active status flag
βͺοΈ Authentication token
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπ»πͺ Consorcio Credicard allegedly breached: 5,000,000+ records exposed from the Venezuelan credit card processing consortium
A threat actor is offering a 5,000,000+ record database from Consorcio Credicard, a Venezuelan credit card processing consortium headquartered in Caracas, founded in 1988, with approximately 1,000+ employees, supporting Visa, Mastercard, and American Express transactions across Venezuela. The leak reportedly includes user accounts, business records, and customer profiles tied to Venezuelan citizens and merchants.
βΈ Actor: MDGhost (The BlackH4t MD-Ghost)
βΈ Sector: Financial Services / Payment Processing
βΈ Type: Data Sale
βΈ Records: 5,000,000+
βΈ Country: Venezuela
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID, email, account attributes, status flags
βͺοΈ Created by, last modified by, creation date, last modification date, last login
βͺοΈ DNI (Venezuelan national ID), full name (first and last)
βͺοΈ Phone numbers (home and mobile)
βͺοΈ Full street address (street, number, parroquia, municipio, estado)
βͺοΈ Account numbers tied to financial accounts
βͺοΈ Nationality, occupation, civil status
βͺοΈ Business records including bank ID, gestiΓ³n, apartir_venta, planilla_affi, vta_c_autorizacion, corrective, instalacion flags
βͺοΈ Mercantile registry information (RIF, business name, registry details)
βͺοΈ Customer profile records with primary and secondary email addresses
βͺοΈ Linked forms, profile IDs, and terms/conditions acceptance data
βͺοΈ Document references (REGISTRO MERCANTIL entries)
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor is offering a 5,000,000+ record database from Consorcio Credicard, a Venezuelan credit card processing consortium headquartered in Caracas, founded in 1988, with approximately 1,000+ employees, supporting Visa, Mastercard, and American Express transactions across Venezuela. The leak reportedly includes user accounts, business records, and customer profiles tied to Venezuelan citizens and merchants.
βΈ Actor: MDGhost (The BlackH4t MD-Ghost)
βΈ Sector: Financial Services / Payment Processing
βΈ Type: Data Sale
βΈ Records: 5,000,000+
βΈ Country: Venezuela
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ User ID, email, account attributes, status flags
βͺοΈ Created by, last modified by, creation date, last modification date, last login
βͺοΈ DNI (Venezuelan national ID), full name (first and last)
βͺοΈ Phone numbers (home and mobile)
βͺοΈ Full street address (street, number, parroquia, municipio, estado)
βͺοΈ Account numbers tied to financial accounts
βͺοΈ Nationality, occupation, civil status
βͺοΈ Business records including bank ID, gestiΓ³n, apartir_venta, planilla_affi, vta_c_autorizacion, corrective, instalacion flags
βͺοΈ Mercantile registry information (RIF, business name, registry details)
βͺοΈ Customer profile records with primary and secondary email addresses
βͺοΈ Linked forms, profile IDs, and terms/conditions acceptance data
βͺοΈ Document references (REGISTRO MERCANTIL entries)
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
π’ Breached announces Partnership Program launch with tiered benefits and IntelVault integration
The owner of Breached has announced the launch of an official Partnership Program. The program offers benefits including discounts on rank upgrades and forum purchases, early access to new features, and integration with IntelVault, a breach data search engine offering API access to forum partners.
βΈ Actor: [Owner] diencracked
βΈ Sector: Cybercrime Forum / Partnership Program
βΈ Type: Forum Announcement
βΈ Country: N/A
βΈ Date: 11/05/2026
Program details:
βͺοΈ Anyone who previously had ads or was working with the forum is automatically considered de-facto in the program
βͺοΈ New members must apply through the official application page
βͺοΈ Partners receive discounts on rank upgrades and forum purchases
βͺοΈ Partners get early access to new forum features
βͺοΈ IntelVault API integration available for partners with their own API or source code
βͺοΈ All BreachForums members receive 5 free IntelVault searches
βͺοΈ Current featured partners include IntelVault (Platinum), PureDrop (Gold), SSNG OSINT (Gold), and vShield (Gold)
βͺοΈ More announcements stated to be coming soon
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
The owner of Breached has announced the launch of an official Partnership Program. The program offers benefits including discounts on rank upgrades and forum purchases, early access to new features, and integration with IntelVault, a breach data search engine offering API access to forum partners.
βΈ Actor: [Owner] diencracked
βΈ Sector: Cybercrime Forum / Partnership Program
βΈ Type: Forum Announcement
βΈ Country: N/A
βΈ Date: 11/05/2026
Program details:
βͺοΈ Anyone who previously had ads or was working with the forum is automatically considered de-facto in the program
βͺοΈ New members must apply through the official application page
βͺοΈ Partners receive discounts on rank upgrades and forum purchases
βͺοΈ Partners get early access to new forum features
βͺοΈ IntelVault API integration available for partners with their own API or source code
βͺοΈ All BreachForums members receive 5 free IntelVault searches
βͺοΈ Current featured partners include IntelVault (Platinum), PureDrop (Gold), SSNG OSINT (Gold), and vShield (Gold)
βͺοΈ More announcements stated to be coming soon
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€1
βΌοΈπ«π· Mistral AI allegedly breached: ~5GB of internal source code and ~450 private repositories exposed from the French AI company by TeamPCP
A threat group is selling approximately 5GB of internal repositories and source code allegedly belonging to Mistral AI and Mistral Solutions, covering training, fine-tuning, benchmarking, dashboard/platform, model delivery and inference, experiments, and future projects.
The actor is demanding a $25,000 BIN, stating they will shred the data permanently and sell to one buyer only, and threatening to leak all ~450 repositories for free to the forums within a week if no buyer is found.
βΈ Actor: TeamPCP
βΈ Sector: Artificial Intelligence / Source Code
βΈ Type: Data Sale (with leak threat)
βΈ Records: ~450 internal repositories, ~5GB total
βΈ Country: France
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ mistral-inference-internal.tar.gz
βͺοΈ mistral-inference-private.tar.gz
βͺοΈ mistral-lawyer-internal.tar.gz
βͺοΈ mistral_finance_agent.tar.gz
βͺοΈ mistral-compute-poc.tar.gz
βͺοΈ mistral-fabric.tar.gz
βͺοΈ finetuning-feedback.tar.gz
βͺοΈ mistral-finetune-internal.tar.gz
βͺοΈ cma-customer-care-internal.tar.gz
βͺοΈ mistral-common-internal.tar.gz
βͺοΈ chatbot-security-evaluation.tar.gz
βͺοΈ kyc-doc-agent.tar.gz
βͺοΈ dashboard.tar.gz
βͺοΈ devstral-cloud.tar.gz
βͺοΈ finance.tar.gz
βͺοΈ typhoon.tar.gz
βͺοΈ turbine.tar.gz
βͺοΈ mistral-surge.tar.gz
βͺοΈ mistral-solutions.tar.gz
βͺοΈ surge-validators.tar.gz
βͺοΈ website-v3.tar.gz
βͺοΈ xformers.tar.gz
βͺοΈ piper-segmentation.tar.gz
βͺοΈ pfizer-rfp-2025.tar.gz
βͺοΈ Internal repositories tied to model training, fine-tuning, benchmarking, dashboard and platform code, model delivery and inference systems, experiments, and future project work
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat group is selling approximately 5GB of internal repositories and source code allegedly belonging to Mistral AI and Mistral Solutions, covering training, fine-tuning, benchmarking, dashboard/platform, model delivery and inference, experiments, and future projects.
The actor is demanding a $25,000 BIN, stating they will shred the data permanently and sell to one buyer only, and threatening to leak all ~450 repositories for free to the forums within a week if no buyer is found.
βΈ Actor: TeamPCP
βΈ Sector: Artificial Intelligence / Source Code
βΈ Type: Data Sale (with leak threat)
βΈ Records: ~450 internal repositories, ~5GB total
βΈ Country: France
βΈ Date: 11/05/2026
Compromised data:
βͺοΈ mistral-inference-internal.tar.gz
βͺοΈ mistral-inference-private.tar.gz
βͺοΈ mistral-lawyer-internal.tar.gz
βͺοΈ mistral_finance_agent.tar.gz
βͺοΈ mistral-compute-poc.tar.gz
βͺοΈ mistral-fabric.tar.gz
βͺοΈ finetuning-feedback.tar.gz
βͺοΈ mistral-finetune-internal.tar.gz
βͺοΈ cma-customer-care-internal.tar.gz
βͺοΈ mistral-common-internal.tar.gz
βͺοΈ chatbot-security-evaluation.tar.gz
βͺοΈ kyc-doc-agent.tar.gz
βͺοΈ dashboard.tar.gz
βͺοΈ devstral-cloud.tar.gz
βͺοΈ finance.tar.gz
βͺοΈ typhoon.tar.gz
βͺοΈ turbine.tar.gz
βͺοΈ mistral-surge.tar.gz
βͺοΈ mistral-solutions.tar.gz
βͺοΈ surge-validators.tar.gz
βͺοΈ website-v3.tar.gz
βͺοΈ xformers.tar.gz
βͺοΈ piper-segmentation.tar.gz
βͺοΈ pfizer-rfp-2025.tar.gz
βͺοΈ Internal repositories tied to model training, fine-tuning, benchmarking, dashboard and platform code, model delivery and inference systems, experiments, and future project work
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€2
π’ Breached and TeamPCP announce supply chain attack competition with $1,000 USD prize and open-sourced Shai Hulud worm
The owner of Breached has announced a joint competition with TeamPCP offering $1,000 USD in XMR to whoever conducts the biggest supply chain attack.
As part of the announcement, TeamPCP's Shai Hulud worm has been open-sourced and hosted on the Breached CDN (also published yesterday on GitHub), with participants required to use the worm in their attacks. Winners are determined by total weekly and monthly download counts of compromised packages, with smaller package compromises added together to count toward the total.
βΈ Actor: [Owner] diencracked in collaboration with TeamPCP
βΈ Sector: Cybercrime Forum / Supply Chain Attack Tooling
βΈ Type: Attack Competition Announcement / Tool Release
βΈ Prize: $1,000 USD (XMR only)
βΈ Country: N/A
βΈ Date: 11/05/2026
Competition details:
βͺοΈ First-ever supply chain attack competition hosted on BreachForums
βͺοΈ TeamPCP's Shai Hulud worm released as open source and hosted on the Breached CDN
βͺοΈ Raw download link also provided for the worm
βͺοΈ Participants must use the Shai Hulud worm in their attack
βͺοΈ Submissions must include the participant's forum handle, preferably linked to their Breached profile
βͺοΈ Reasonable proof of access must be submitted alongside the entry
βͺοΈ Winner determined by the largest supply chain attack measured by weekly and monthly package downloads
βͺοΈ Compromises of multiple small packages are aggregated toward the total
βͺοΈ Prize paid by diencracked in XMR
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
The owner of Breached has announced a joint competition with TeamPCP offering $1,000 USD in XMR to whoever conducts the biggest supply chain attack.
As part of the announcement, TeamPCP's Shai Hulud worm has been open-sourced and hosted on the Breached CDN (also published yesterday on GitHub), with participants required to use the worm in their attacks. Winners are determined by total weekly and monthly download counts of compromised packages, with smaller package compromises added together to count toward the total.
βΈ Actor: [Owner] diencracked in collaboration with TeamPCP
βΈ Sector: Cybercrime Forum / Supply Chain Attack Tooling
βΈ Type: Attack Competition Announcement / Tool Release
βΈ Prize: $1,000 USD (XMR only)
βΈ Country: N/A
βΈ Date: 11/05/2026
Competition details:
βͺοΈ First-ever supply chain attack competition hosted on BreachForums
βͺοΈ TeamPCP's Shai Hulud worm released as open source and hosted on the Breached CDN
βͺοΈ Raw download link also provided for the worm
βͺοΈ Participants must use the Shai Hulud worm in their attack
βͺοΈ Submissions must include the participant's forum handle, preferably linked to their Breached profile
βͺοΈ Reasonable proof of access must be submitted alongside the entry
βͺοΈ Winner determined by the largest supply chain attack measured by weekly and monthly package downloads
βͺοΈ Compromises of multiple small packages are aggregated toward the total
βͺοΈ Prize paid by diencracked in XMR
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1β€1
βΌοΈ New Dark Web Informer Blog Post!
Title: Akitatek Allegedly Breached Exposing 5,400 Customer Records From the French IT Services and Electronics Repair Company
Link: https://darkwebinformer.com/akitatek-allegedly-breached-exposing-5-400-customer-records-from-the-french-it-services-and-electronics-repair-company/
Title: Akitatek Allegedly Breached Exposing 5,400 Customer Records From the French IT Services and Electronics Repair Company
Link: https://darkwebinformer.com/akitatek-allegedly-breached-exposing-5-400-customer-records-from-the-french-it-services-and-electronics-repair-company/
Dark Web Informer
Akitatek Allegedly Breached Exposing 5,400 Customer Records From the French IT Services and Electronics Repair Company
A threat actor is leaking the customer database of Akitatek, a French IT services and electronics repair company.
Forwarded from FBI Watchdog Alerts by Dark Web Informer
β οΈ FBI Watchdog - DNS Change (A) β οΈ
π DarkWebInformer.com - Cyber Threat Intelligence
Domain: pwnforums.st
Record Type: DNS Change (A)
Time Detected: 2026-05-13 13:19:23 UTC
Previous Records:
New Records:
π DarkWebInformer.com - Cyber Threat Intelligence
Domain: pwnforums.st
Record Type: DNS Change (A)
Time Detected: 2026-05-13 13:19:23 UTC
Previous Records:
209.99.188.105
New Records:
79.172.207.17
βΌοΈ New Dark Web Informer Blog Post!
Title: Ministry of Health of Vietnam Allegedly Breached Exposing 480,000 Medical Staff Records From the Vietnamese Government Health Authority
Link: https://darkwebinformer.com/ministry-of-health-of-vietnam-allegedly-breached-exposing-480-000-medical-staff-records-from-the-vietnamese-government-health-authority/
Title: Ministry of Health of Vietnam Allegedly Breached Exposing 480,000 Medical Staff Records From the Vietnamese Government Health Authority
Link: https://darkwebinformer.com/ministry-of-health-of-vietnam-allegedly-breached-exposing-480-000-medical-staff-records-from-the-vietnamese-government-health-authority/
Dark Web Informer
Ministry of Health of Vietnam Allegedly Breached Exposing 480,000 Medical Staff Records From the Vietnamese Government Health Authority
A threat actor claims to have exfiltrated a database from the Ministry of Health of Vietnam containing over 480,000 sensitive records, including the personal data of doctors, nurses, and medical staff.
βΌοΈ New Dark Web Informer Blog Post!
Title: SIVVI Allegedly Breached: Approximately 300,000 Customer Records Reposted From the Dubai-Based Fashion E-Commerce Platform
Link: https://darkwebinformer.com/sivvi-allegedly-breached-approximately-300-000-customer-records-reposted-from-the-dubai-based-fashion-e-commerce-platform/
Title: SIVVI Allegedly Breached: Approximately 300,000 Customer Records Reposted From the Dubai-Based Fashion E-Commerce Platform
Link: https://darkwebinformer.com/sivvi-allegedly-breached-approximately-300-000-customer-records-reposted-from-the-dubai-based-fashion-e-commerce-platform/
Dark Web Informer
SIVVI Allegedly Breached: Approximately 300,000 Customer Records Reposted From the Dubai-Based Fashion E-Commerce Platform
A threat actor is reposting the previously reported SIVVI database for sale, listing approximately 300,000 UAE customer records from the Dubai-based fashion e-commerce platform founded in 2014 and now owned by noon.
βΌοΈπΉπΌ FOXCONN has fallen victim to Nitrogen Ransomware
Data: 8TB over 11 Million files
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Data: 8TB over 11 Million files
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ New Dark Web Informer Blog Post!
Title: NTN Bearing Corporation of America Allegedly Hit by PayoutsKing Ransomware: 596 GB Exfiltrated From the American Ball and Roller Bearing Manufacturer, Including US Army JLTV Program Documents
Link: https://darkwebinformer.com/ntn-bearing-corporation-of-america-allegedly-hit-by-payoutsking-ransomware-596-gb-exfiltrated-from-the-american-ball-and-roller-bearing-manufacturer-including-us-army-jltv-program-docum/
Title: NTN Bearing Corporation of America Allegedly Hit by PayoutsKing Ransomware: 596 GB Exfiltrated From the American Ball and Roller Bearing Manufacturer, Including US Army JLTV Program Documents
Link: https://darkwebinformer.com/ntn-bearing-corporation-of-america-allegedly-hit-by-payoutsking-ransomware-596-gb-exfiltrated-from-the-american-ball-and-roller-bearing-manufacturer-including-us-army-jltv-program-docum/
Dark Web Informer
NTN Bearing Corporation of America Allegedly Hit by PayoutsKing Ransomware: 596 GB Exfiltrated From the American Ball and Rollerβ¦
A threat actor operating under the PayoutsKing brand (self-described as βNot RaaSβ) has listed NTN Bearing Corporation of America on its extortion leak site, claiming to have exfiltrated 596 GB of data from the American manufacturer, a subsidiary of the globalβ¦