βΌοΈπ§π· Nuvidio allegedly breached: 40K files including KYC records, biometrics, private keys, customer video calls, and cloud infrastructure data exposed
A threat actor claims to have breached Nuvidio, a Brazilian identity verification and biometric onboarding provider used by financial institutions and fintech companies for KYC, video verification, and fraud prevention services.
The actor alleges the dataset contains approximately 40,000 files totaling 6.3 GB, including identity documents, customer biometric recordings, production credentials, private keys, AWS infrastructure data, and internal monitoring systems.
βΈ Actor: xpI0itrs
βΈ Sector: Identity Verification / Fintech / Biometrics
βΈ Type: Data Breach
βΈ Records: 40,000+ files
βΈ Country: Brazil
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Production credentials for major services including MongoDB, PostgreSQL, AWS IAM, Twilio, Redis, RabbitMQ, OpenSearch, and Microsoft Cognitive Services
βͺοΈ 192 Brazilian citizen identity document records including RG and CNH scans with CPF-linked filenames, photographs, fingerprints, addresses, and birth dates
βͺοΈ Approximately 3.1 GB of customer video call recordings involving KYC verification and financial onboarding sessions
βͺοΈ Voice biometric and speaker diarization audio files allegedly linked to customer verification systems
βͺοΈ SSL and mTLS private keys with references to Banco Pan internal API authentication infrastructure
βͺοΈ Complete AWS infrastructure mapping data including Terraform state files, CloudFormation templates, CloudTrail logs, VPC flow logs, ECS cluster schedules, Lambda configurations, and environment variables
βͺοΈ Grafana backups containing employee account information and encrypted CloudWatch credentials
βͺοΈ User-uploaded customer chat files and identity verification attachments allegedly shared during onboarding sessions
βͺοΈ Web application source code, frontend builds, and source maps allegedly usable for reverse engineering and exploitation
Affected organizations and referenced clients allegedly include Banco Pan, BMG Money, Bradesco, Banco Mercantil, Ailos, iCred, Pipe, Claro, C6 Bank, Caixa, Agibank, Equatorial, and others.
The actor is offering the dataset for sale at $12,000 and claims the exposed material spans records dated between 2021 and May 2025.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have breached Nuvidio, a Brazilian identity verification and biometric onboarding provider used by financial institutions and fintech companies for KYC, video verification, and fraud prevention services.
The actor alleges the dataset contains approximately 40,000 files totaling 6.3 GB, including identity documents, customer biometric recordings, production credentials, private keys, AWS infrastructure data, and internal monitoring systems.
βΈ Actor: xpI0itrs
βΈ Sector: Identity Verification / Fintech / Biometrics
βΈ Type: Data Breach
βΈ Records: 40,000+ files
βΈ Country: Brazil
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Production credentials for major services including MongoDB, PostgreSQL, AWS IAM, Twilio, Redis, RabbitMQ, OpenSearch, and Microsoft Cognitive Services
βͺοΈ 192 Brazilian citizen identity document records including RG and CNH scans with CPF-linked filenames, photographs, fingerprints, addresses, and birth dates
βͺοΈ Approximately 3.1 GB of customer video call recordings involving KYC verification and financial onboarding sessions
βͺοΈ Voice biometric and speaker diarization audio files allegedly linked to customer verification systems
βͺοΈ SSL and mTLS private keys with references to Banco Pan internal API authentication infrastructure
βͺοΈ Complete AWS infrastructure mapping data including Terraform state files, CloudFormation templates, CloudTrail logs, VPC flow logs, ECS cluster schedules, Lambda configurations, and environment variables
βͺοΈ Grafana backups containing employee account information and encrypted CloudWatch credentials
βͺοΈ User-uploaded customer chat files and identity verification attachments allegedly shared during onboarding sessions
βͺοΈ Web application source code, frontend builds, and source maps allegedly usable for reverse engineering and exploitation
Affected organizations and referenced clients allegedly include Banco Pan, BMG Money, Bradesco, Banco Mercantil, Ailos, iCred, Pipe, Claro, C6 Bank, Caixa, Agibank, Equatorial, and others.
The actor is offering the dataset for sale at $12,000 and claims the exposed material spans records dated between 2021 and May 2025.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ DOJ Press Release
βββββββββββββββββββββ
Wisconsin Man Sentenced to 13 Years in Prison for Using the Internet to Sexually Exploit a Minor in the Philippines
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
βββββββββββββββββββββ
Wisconsin Man Sentenced to 13 Years in Prison for Using the Internet to Sexually Exploit a Minor in the Philippines
Full Press Release β justice.gov
βββββββββββββββββββββ
π΅οΈ Dark Web Informer β’ DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
Wisconsin Man Sentenced to 13 Years in Prison for Using the Internet
Bradley D. Hounsell, 44, of Oshkosh, Wisconsin, was sentenced today to 13 years in prison, to be followed by seven years of supervised release, for using the internet to coerce and entice a minor in the Philippines to engage in unlawful sexual conduct.
I have played maybe a hour of Subnautica 2 today and it's a solid game for anyone who wanted to know.
β€2
βΌοΈ New Dark Web Informer Blog Post!
Title: CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Link: https://darkwebinformer.com/cve-2026-20182-critical-cisco-sd-wan-auth-bypass-under-active-exploitation/
Title: CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Link: https://darkwebinformer.com/cve-2026-20182-critical-cisco-sd-wan-auth-bypass-under-active-exploitation/
Dark Web Informer
CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Cisco has disclosed and patched CVE-2026-20182, a maximum-severity authentication bypass affecting Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager.
β€1
π¨ Nightmare Eclipse just released another vulnerability called MiniPlasma
GitHub: https://github.com/Nightmare-Eclipse/MiniPlasma
CVE: CVE-2020-17103 which is a high-severity elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver that allows an attacker to gain elevated, unauthorized access to a targeted system
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
GitHub: https://github.com/Nightmare-Eclipse/MiniPlasma
CVE: CVE-2020-17103 which is a high-severity elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver that allows an attacker to gain elevated, unauthorized access to a targeted system
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€1π1
βΌοΈπ»πͺ CANTV ABA Ultra allegedly breached: 7.5K subscriber records and 4K OLT/GPON network device records exposed from Venezuelan fiber broadband infrastructure
A threat actor claims to have compromised a UISP Ubiquiti administration panel linked to CANTV ABA Ultra, the fiber broadband service operated by CompaΓ±Γa AnΓ³nima Nacional TelΓ©fonos de Venezuela (CANTV). The actor alleges the breach exposed personal subscriber data, financial records, and detailed GPON/OLT network device inventory information across Eastern Venezuela.
βΈ Actor: GordonFreeman
βΈ Sector: Telecommunications / Fiber Broadband / GPON Infrastructure
βΈ Type: Data Breach
βΈ Records: 7,500 subscriber records and 4,000 network device records
βΈ Country: Venezuela
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Subscriber records allegedly including customer names, emails, phone numbers, addresses, user IDs, registration dates, customer type, service plans, pricing, account status, and banking-related fields
βͺοΈ CANTV ABA Ultra fiber broadband customer data tied to residential service deployments in Eastern Venezuela
βͺοΈ ONT/customer equipment references including MAC ONT values, plan details, service status, and geographic coordinates
βͺοΈ OLT/GPON network device records allegedly including MAC addresses, hostnames, serial numbers, firmware versions, bridge versions, device models, vendor details, and platform identifiers
βͺοΈ Network topology metadata including site IDs, parent relationships, device roles, uplink devices, interface references, authorization status, and operational state
βͺοΈ Infrastructure monitoring data including CPU, RAM, signal levels, uptime, service time, outage scores, voltage, power status, temperature, battery capacity, and maintenance flags
βͺοΈ Location-related infrastructure records allegedly including latitude, longitude, elevation, heading, and node placement metadata
The actor claims the exposed data maps thousands of CANTV ABA Ultra subscribers and GPON/OLT infrastructure assets across the affected region.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have compromised a UISP Ubiquiti administration panel linked to CANTV ABA Ultra, the fiber broadband service operated by CompaΓ±Γa AnΓ³nima Nacional TelΓ©fonos de Venezuela (CANTV). The actor alleges the breach exposed personal subscriber data, financial records, and detailed GPON/OLT network device inventory information across Eastern Venezuela.
βΈ Actor: GordonFreeman
βΈ Sector: Telecommunications / Fiber Broadband / GPON Infrastructure
βΈ Type: Data Breach
βΈ Records: 7,500 subscriber records and 4,000 network device records
βΈ Country: Venezuela
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Subscriber records allegedly including customer names, emails, phone numbers, addresses, user IDs, registration dates, customer type, service plans, pricing, account status, and banking-related fields
βͺοΈ CANTV ABA Ultra fiber broadband customer data tied to residential service deployments in Eastern Venezuela
βͺοΈ ONT/customer equipment references including MAC ONT values, plan details, service status, and geographic coordinates
βͺοΈ OLT/GPON network device records allegedly including MAC addresses, hostnames, serial numbers, firmware versions, bridge versions, device models, vendor details, and platform identifiers
βͺοΈ Network topology metadata including site IDs, parent relationships, device roles, uplink devices, interface references, authorization status, and operational state
βͺοΈ Infrastructure monitoring data including CPU, RAM, signal levels, uptime, service time, outage scores, voltage, power status, temperature, battery capacity, and maintenance flags
βͺοΈ Location-related infrastructure records allegedly including latitude, longitude, elevation, heading, and node placement metadata
The actor claims the exposed data maps thousands of CANTV ABA Ultra subscribers and GPON/OLT infrastructure assets across the affected region.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ A Scam Tools dataset allegedly leaked: 1.2K user records exposed from a scam-tool platform database
A threat actor claims to have leaked an old dataset associated with scam-tool infrastructure, allegedly exposing user records and account activity data from a platform used for fraudulent tooling. The actor alleges the database contains user profile entries, activity timestamps, message counts, and usernames.
βΈ Actor: explode
βΈ Sector: Cybercrime Infrastructure / Scam Tools
βΈ Type: Database Leak
βΈ Records: 1,235 user records
βΈ Country: Unknown / Global
Compromised data:
βͺοΈ User account records from an alleged scam-tool database
βͺοΈ Usernames and profile-related identifiers
βͺοΈ Account activity timestamps including last-seen data
βͺοΈ Message count metadata linked to user profiles
βͺοΈ Export metadata showing when the dataset was generated
βͺοΈ Database sample records shared publicly as proof of access
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked an old dataset associated with scam-tool infrastructure, allegedly exposing user records and account activity data from a platform used for fraudulent tooling. The actor alleges the database contains user profile entries, activity timestamps, message counts, and usernames.
βΈ Actor: explode
βΈ Sector: Cybercrime Infrastructure / Scam Tools
βΈ Type: Database Leak
βΈ Records: 1,235 user records
βΈ Country: Unknown / Global
Compromised data:
βͺοΈ User account records from an alleged scam-tool database
βͺοΈ Usernames and profile-related identifiers
βͺοΈ Account activity timestamps including last-seen data
βͺοΈ Message count metadata linked to user profiles
βͺοΈ Export metadata showing when the dataset was generated
βͺοΈ Database sample records shared publicly as proof of access
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈπΊπΈβ‘οΈ Lightning AI allegedly breached: internal codebase and project files exposed from the creators of PyTorch Lightning
A threat actor claims to have leaked internal data belonging to Lightning AI, the company behind PyTorch Lightning. The actor alleges the exposed material includes internal repositories, application code, private project directories, development resources, and additional files tied to Lightning AIβs engineering environment.
βΈ Actor: diencracked
βΈ Sector: Artificial Intelligence / Software Development
βΈ Type: Data Leak
βΈ Records: 1,360 directories and 10,239 files
βΈ Country: United States
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Internal source code and repository directories allegedly linked to Lightning AI projects
βͺοΈ Private application and platform code related to Lightning AI services
βͺοΈ Development resources including plugins, templates, extensions, benchmarks, and deployment materials
βͺοΈ Internal project folders referencing CI/CD, customer issue tracking, cloud workflows, and engineering tooling
βͺοΈ Archived data samples showing directory listings and file counts
βͺοΈ Additional hidden data allegedly shared through restricted forum content
The actor references a prior PyPI credential compromise involving PyTorch Lightning and claims the leaked material includes internal codebase files and extra data obtained from Lightning AI systems.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked internal data belonging to Lightning AI, the company behind PyTorch Lightning. The actor alleges the exposed material includes internal repositories, application code, private project directories, development resources, and additional files tied to Lightning AIβs engineering environment.
βΈ Actor: diencracked
βΈ Sector: Artificial Intelligence / Software Development
βΈ Type: Data Leak
βΈ Records: 1,360 directories and 10,239 files
βΈ Country: United States
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Internal source code and repository directories allegedly linked to Lightning AI projects
βͺοΈ Private application and platform code related to Lightning AI services
βͺοΈ Development resources including plugins, templates, extensions, benchmarks, and deployment materials
βͺοΈ Internal project folders referencing CI/CD, customer issue tracking, cloud workflows, and engineering tooling
βͺοΈ Archived data samples showing directory listings and file counts
βͺοΈ Additional hidden data allegedly shared through restricted forum content
The actor references a prior PyPI credential compromise involving PyTorch Lightning and claims the leaked material includes internal codebase files and extra data obtained from Lightning AI systems.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
βΌοΈ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 14th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-14th-2026/
Title: Daily Dose of Dark Web Informer - May 14th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-14th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 14th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
Chat, just a reminder to join the backup channel. Save yourself time looking for the new channel incase this one goes. https://t.me/SliceForLifeeee
Telegram
πͺ Slice For Life - Part 3 πͺ
Main: t.me/SliceForLifeee
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
β€1
Cyberattack News Alert
βββββββββββββββββββββββββ
Victim: ζ ͺεΌδΌη€Ύγͺγͺγ¨γ³γΏγ«γγ€γ€γ’γ³γ
Domain:
Country: π―π΅ JP
Date: May 12th, 2026
Claimed by: Thegentlemen ransomware gang
Summary:
Oriental Diamond announced that on May 4, 2026, it fell victim to a ransomware cyberattack carried out by a third party, which resulted in the encryption of data on its internal servers and a risk of personal data leakage. The company immediately isolated its servers from the network, reported the incident to the police and the Personal Data Protection Commission, and launched an investigation as well as restoration work entrusted to external experts. It stated that it would henceforth strive to prevent any recurrence and restore trust by implementing measures such as suspending VPN usage and strengthening authentication procedures.
Source: https://www.orientaldiamond.jp/γη₯γγ
βββββββββββββββββββββββββ
Victim: ζ ͺεΌδΌη€Ύγͺγͺγ¨γ³γΏγ«γγ€γ€γ’γ³γ
Domain:
orientaldiamond.jpCountry: π―π΅ JP
Date: May 12th, 2026
Claimed by: Thegentlemen ransomware gang
Summary:
Oriental Diamond announced that on May 4, 2026, it fell victim to a ransomware cyberattack carried out by a third party, which resulted in the encryption of data on its internal servers and a risk of personal data leakage. The company immediately isolated its servers from the network, reported the incident to the police and the Personal Data Protection Commission, and launched an investigation as well as restoration work entrusted to external experts. It stated that it would henceforth strive to prevent any recurrence and restore trust by implementing measures such as suspending VPN usage and strengthening authentication procedures.
Source: https://www.orientaldiamond.jp/γη₯γγ
βΌοΈπΊπΈ Eli Lilly allegedly breached: 1.2K internal repositories and 40GB of Veeva Vault documents exposed from drug development and clinical trial systems up for sale for $70K
A threat actor claims to have obtained internal codebases belonging to Eli Lilly and Company, the global pharmaceutical manufacturer. The actor alleges the exposed material includes repositories and documents tied to drug development, clinical trials, patient enrollment, medical devices, manufacturing systems, computational biology, and internal AI tooling.
βΈ Actor: TeamPCP
βΈ Sector: Pharmaceuticals / Biotechnology / Healthcare
βΈ Type: Data Breach
βΈ Records: 1,200+ repositories and 40GB of documents
βΈ Country: United States
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Internal code repositories allegedly linked to Eli Lilly platforms and development environments
βͺοΈ Drug research tools, clinical trial programs, and computational biology codebases
βͺοΈ Internal AI agent projects and software development kit implementations
βͺοΈ Medical device, manufacturing system, and clinical monitoring-related code
βͺοΈ Patient enrollment and trial operations project files
βͺοΈ Veeva Vault documents allegedly totaling approximately 40GB
βͺοΈ DevOps and infrastructure-related project references across company systems
The actor claims the exposed material includes more than 80GB of compressed code across 1.2K+ repositories, along with documents allegedly stolen from the companyβs Veeva Vault environment.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have obtained internal codebases belonging to Eli Lilly and Company, the global pharmaceutical manufacturer. The actor alleges the exposed material includes repositories and documents tied to drug development, clinical trials, patient enrollment, medical devices, manufacturing systems, computational biology, and internal AI tooling.
βΈ Actor: TeamPCP
βΈ Sector: Pharmaceuticals / Biotechnology / Healthcare
βΈ Type: Data Breach
βΈ Records: 1,200+ repositories and 40GB of documents
βΈ Country: United States
βΈ Date: 14/05/2026
Compromised data:
βͺοΈ Internal code repositories allegedly linked to Eli Lilly platforms and development environments
βͺοΈ Drug research tools, clinical trial programs, and computational biology codebases
βͺοΈ Internal AI agent projects and software development kit implementations
βͺοΈ Medical device, manufacturing system, and clinical monitoring-related code
βͺοΈ Patient enrollment and trial operations project files
βͺοΈ Veeva Vault documents allegedly totaling approximately 40GB
βͺοΈ DevOps and infrastructure-related project references across company systems
The actor claims the exposed material includes more than 80GB of compressed code across 1.2K+ repositories, along with documents allegedly stolen from the companyβs Veeva Vault environment.
Stop guessing what's redacted. Subscribers see everything β darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations