πŸ”ͺ Slice For Life - Part 2 πŸ”ͺ
3.06K subscribers
639 photos
14 videos
440 links
Download Telegram
A company that has an API subscription requested a specific forum to be scraped that is Tor only. I'm testing that functionality now with another forum. Assuming everything works properly I will be onboarding Tor only forums starting next week. Thought I would share.
❀1πŸ”₯1
‼️ DOJ Press Release
━━━━━━━━━━━━━━━━━━━━━

Georgia Woman Who Faked Identity of Pregnant Teen to Target Adoptive Parents Sentenced on Cyberstalking and Threat Offenses

Full Press Release β†’ justice.gov

━━━━━━━━━━━━━━━━━━━━━
πŸ•΅οΈ Dark Web Informer β€’ DOJ Monitor

Note: DOJ articles that are not Cyber related will be removed manually.
‼️@TheGentlemen26 The Gentlemen are allegedly recruiting affiliates: ransomware-as-a-service program and locker tooling advertised on underground forum

A threat actor claims to be promoting The Gentlemen’s RaaS, a ransomware affiliate program targeting access brokers, pentesters, and criminal operators. The post advertises affiliate revenue sharing, victim negotiation control, locker and decryptor tooling, and cross-platform support for enterprise environments.

β–Έ Actor: hastalamuerte
β–Έ Sector: Ransomware-as-a-Service / Cybercrime Infrastructure
β–Έ Type: RaaS Advertisement
β–Έ Records: Not applicable
β–Έ Country: Unknown / Global
β–Έ Date: 15/05/2026

Advertised capabilities:

β–ͺ️ Ransomware affiliate program allegedly offering revenue sharing and victim negotiation control
β–ͺ️ Locker and decryptor tooling promoted for Windows, Linux, NAS, BSD, and ESXi environments
β–ͺ️ Cross-platform support for enterprise and virtualized infrastructure
β–ͺ️ Features marketed around selective encryption, network targeting, and automated operation
β–ͺ️ Affiliate access requirements involving prepared target data or deposits
β–ͺ️ Additional tooling references including EDR-related components, builder access, and multichain pivot support

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡ΊπŸ‡Έ Grafana has been claimed a victim to Coinbasecartel
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡»πŸ‡ͺ Movistar Venezuela allegedly breached: 4.15M customer phone records exposed from 2026 telecom database

A threat actor claims to have breached Movistar Venezuela, a major Venezuelan telecommunications provider operated by TelefΓ³nica. The actor alleges the exposed dataset contains 4.15 million current phone number records from 2026, including subscriber identifiers, account details, geographic area data, lifecycle status, payment method, and product line information.

β–Έ Actor: GordonFreeman
β–Έ Sector: Telecommunications / Mobile Network Operator
β–Έ Type: Database Leak
β–Έ Records: 4.15 million customer records
β–Έ Country: Venezuela
β–Έ Date: 15/05/2026

Compromised data:

β–ͺ️ Customer phone number records allegedly linked to Movistar Venezuela
β–ͺ️ Subscriber ID and account number fields
β–ͺ️ Billing account number records
β–ͺ️ Customer names and identity number fields
β–ͺ️ Geographic area and service region data
β–ͺ️ Lifecycle status and product line information
β–ͺ️ Payment method fields tied to subscriber accounts

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️TeamPCP announces forum co-ownership: platform operations, partnerships, moderation, and resource quality responsibilities outlined

TeamPCP announced its new role as co-owners of the Breached forum platform, stating the team will help manage staffing, partnerships, community decisions, moderation, escrow services, and premium resource access. The post frames the role as focused on platform reliability, community growth, verified content, and maintaining forum standards.

β–Έ Actor: TeamPCP
β–Έ Sector: Cybercrime Forum / Community Operations
β–Έ Type: Forum Announcement
β–Έ Date: 15/05/2026

Key points:

β–ͺ️ TeamPCP announced a co-ownership role within the Breached forum platform
β–ͺ️ Responsibilities include infrastructure uptime, staff management, moderation, and dispute handling
β–ͺ️ Community growth plans include onboarding partners and expanding access to premium resources
β–ͺ️ Resource quality efforts include verifying shared databases and tools
β–ͺ️ Low-quality, fake, or malicious content is described as subject to removal
β–ͺ️ Members who provide verified material may be rewarded by the platform

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
On Monday, at some point, I will be increasing the rate limit to the API and the accounts who currently have the default limit.

This only applies to the daily request limit. I will update on Monday as to the new request count.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡²πŸ‡½ Acapulco City Government allegedly breached: 97K+ license records exposed from municipal permit data

A threat actor claims to have leaked license records linked to the Acapulco City Government in Mexico. The actor alleges the exposed dataset contains more than 97,000 license records totaling approximately 28GB, including CURP identifiers, photographs, fingerprints, and additional municipal licensing data.

β–Έ Actor: homie157
β–Έ Sector: Government / Municipal Services
β–Έ Type: Database Leak
β–Έ Records: 97,000+ license records
β–Έ Country: Mexico
β–Έ Date: 15/05/2026

Compromised data:

β–ͺ️ Municipal license records allegedly linked to Acapulco City Government systems
β–ͺ️ CURP-related identity fields
β–ͺ️ Photograph records tied to license entries
β–ͺ️ Fingerprint image or biometric-related data
β–ͺ️ Additional license holder information
β–ͺ️ High-volume archive allegedly containing recent and high-quality Acapulco licensing records

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
β€ΌοΈπŸ‡ΊπŸ‡Έ Stansberry Research allegedly breached: 1.17M customer records exposed from investment research subscriber database

A threat actor claims to have leaked a database linked to Stansberry Research, a U.S.-based financial publishing and investment research company. The actor alleges the exposed dataset contains approximately 1,179,000 lines of customer and subscriber records, including contact information, account-related fields, and platform metadata.

β–Έ Actor: STOMP2
β–Έ Sector: Financial Publishing / Investment Research
β–Έ Type: Database Leak
β–Έ Records: 1,179,000 lines
β–Έ Country: United States
β–Έ Date: 16/05/2026

Compromised data:

β–ͺ️ Customer and subscriber records allegedly linked to Stansberry Research
β–ͺ️ Email address fields and contact information
β–ͺ️ Names and profile-related identifiers
β–ͺ️ Phone number fields where available
β–ͺ️ Address records including city, state, country, and postal code fields
β–ͺ️ Account and platform metadata including user IDs, creation dates, and related service identifiers
β–ͺ️ Deposit or subscription-related metadata referenced in sample records

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πŸš¨πŸ‡΅πŸ‡° University of Agriculture Pakistan staff database allegedly leaked

A threat actor claims to have leaked a staff database tied to the University of Agriculture Pakistan, with a second part allegedly planned to include student information in the same format.

━━━━━━━━━━━━━━━━━━━━
Target: University of Agriculture Pakistan
Sector: Education / Higher Education
Incident: Database Leak
Exposure: Staff database records
Actor: FlipperOne
Country: Pakistan
Date: 16/05/2026
━━━━━━━━━━━━━━━━━━━━

What’s allegedly included:

β–ͺ️ Staff identity and profile fields
β–ͺ️ Names, gender, and address-related data
β–ͺ️ Phone, mobile, and fax number fields
β–ͺ️ Primary and secondary email addresses
β–ͺ️ Qualification, specialization, and designation details
β–ͺ️ Administrative and research role information
β–ͺ️ Job status, department, and faculty identifiers
β–ͺ️ Social/profile links, profile photos, resumes, and related staff records

Potential impact:

The exposed data could be used for phishing, impersonation, credential-targeting, and social engineering against university staff and departments.

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πŸš¨πŸ‡ΊπŸ‡Έ IRS tax payment scam page advertised on underground forum

A threat actor is advertising an IRS-themed tax payment scam page, claiming it can collect personal and payment information from victims through a fraudulent form.

━━━━━━━━━━━━━━━━━━━━
Target Theme: IRS Tax Payment
Sector: Government Impersonation / Financial Fraud
Incident: Scam Kit Advertisement
Exposure: Personal and payment data collection
Actor: tgov02
Country: United States
Date: 16/05/2026
━━━━━━━━━━━━━━━━━━━━

What’s allegedly collected:

β–ͺ️ Full names and residential address details
β–ͺ️ City, state, and ZIP code fields
β–ͺ️ Phone numbers and email addresses
β–ͺ️ Date of birth fields
β–ͺ️ Social Security number fields
β–ͺ️ Cardholder and payment card details
β–ͺ️ Expiration date and security code fields

Potential impact:

The scam page could be used for identity theft, payment card fraud, tax-related impersonation, and financial phishing against U.S. victims.

Status:

Underground forum advertisement. The actor posted a sample attachment showing an IRS-themed payment assistant page and requested direct contact from interested buyers.

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
πŸš¨πŸ‡«πŸ‡· Belambra allegedly breached: 402K reservation and customer records exposed from French holiday club database

A threat actor claims to have leaked a database tied to Belambra, a French holiday clubs and hotels network specializing in vacation stays for families, couples, and groups.

━━━━━━━━━━━━━━━━━━━━
Target: Belambra
Sector: Hospitality / Travel / Holiday Clubs
Incident: Database Leak
Exposure: 402K records
Actor: ChimeraZ
Country: France
Date: 16/05/2026
━━━━━━━━━━━━━━━━━━━━

What’s allegedly included:

β–ͺ️ Reservation records linked to Belambra holiday bookings
β–ͺ️ Guest names and contact email fields
β–ͺ️ Booking references and reservation IDs
β–ͺ️ Site and destination information
β–ͺ️ Arrival and departure dates
β–ͺ️ Adult and children count fields
β–ͺ️ User account and client profile metadata
β–ͺ️ Restaurant booking and special-count fields

Potential impact:

The exposed data could be used for targeted phishing, booking impersonation, travel fraud, customer scams, and social engineering against Belambra guests and account holders.

Status:

Unverified underground forum claim. The actor posted structured JSON samples and claims the archive includes reservation, client, and children-related datasets.

Stop guessing what's redacted. Subscribers see everything β†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations