๐Ÿ”ช Slice For Life - Part 2 ๐Ÿ”ช
3.08K subscribers
683 photos
17 videos
489 links
Download Telegram
๐Ÿšจ๐Ÿ‡ฒ๐Ÿ‡ฝ Perfilan allegedly breached: 3.7M Mexican real estate customer records exposed from business service database

A threat actor claims to have leaked part of a customer database tied to Perfilan, a Mexico-based service provider for businesses in the real estate sector.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Perfilan
Sector: Real Estate / Business Services / CRM Data
Incident: Database Leak
Exposure: 3,711,285 records / 83 CSV files / 924MB
Actor: zSenior
Country: Mexico
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Customer and lead records allegedly linked to Perfilan
โ–ช๏ธ Names, phone numbers, and email address fields
โ–ช๏ธ Real estate project and origin/source fields
โ–ช๏ธ Registration dates and lead status information
โ–ช๏ธ Discard reason and general notes fields
โ–ช๏ธ Call count, last call date, and last note metadata
โ–ช๏ธ CRM-style customer interaction and sales pipeline records

Potential impact:

The exposed data could be used for phishing, real estate scams, customer impersonation, lead fraud, and targeted social engineering against buyers, sellers, and real estate businesses.

Status:

Unverified underground forum claim. The actor posted CSV sample data and claims this is a partial leak containing more than 3.7M records.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
I am testing backend functionality with screenshots for the next hour... you may see broken screenshots. I will update once maintenance is complete.
๐Ÿ”ช Slice For Life - Part 2 ๐Ÿ”ช
I am testing backend functionality with screenshots for the next hour... you may see broken screenshots. I will update once maintenance is complete.
Maintenance on threat-feed images is complete, and images should no longer appear broken.

The backend has been updated to run a visual safety check on images before they are sent to the feeds.

Screenshots may be automatically suppressed before appearing in the feed if they fail automated visual safety checks, return an uncertain result, or cannot be scanned.

The alert itself will still appear when text-based threat intelligence is available. Suppression only affects the screenshot preview; it does not necessarily mean the alert is invalid or unrelated to cyber threat activity.

There is no evidence that unsafe imagery has passed through to the feed. I'm remaining transparent with any changes done as always. This is a preventative safety measure. If unsafe imagery were ever to bypass the scanner and other filters, I would take appropriate action, including reporting to law enforcement where required.
๐Ÿšจ๐Ÿ‡ฉ๐Ÿ‡ฟ University of Guelma allegedly breached: seminar management system compromised and user data exposed

A threat actor claims to have compromised the seminar management application hosted by the University of Guelma, an Algerian public university platform used for seminar-related registration and management.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: University of Guelma
Sector: Education / Higher Education
Incident: Data Breach
Exposure: Seminar system database
Actor: govmaroc
Country: Algeria
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Seminar management system database access
โ–ช๏ธ User credential and account-related records
โ–ช๏ธ Personal information tied to seminar users
โ–ช๏ธ Seminar registration and participation details
โ–ช๏ธ Backend database content allegedly accessed through the application
โ–ช๏ธ Administrative system integrity concerns
โ–ช๏ธ University-hosted application data linked to the seminar platform

Potential impact:

The exposed data could be used for phishing, account takeover attempts, impersonation, credential targeting, and further social engineering against students, staff, and seminar participants.

Status:

Unverified underground forum claim.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡ฎ๐Ÿ‡ฉ Indonesian National Armed Forces allegedly breached: 14K military officer records leaked from TNI database

A threat actor claims to have leaked a database tied to the Indonesian National Armed Forces, also known as Tentara Nasional Indonesia (TNI), allegedly exposing personnel and service-related records for military officers.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Indonesian National Armed Forces
Sector: Military / Government / Defense
Incident: Database Leak
Exposure: 14K rows
Actor: mosad
Country: Indonesia
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Military officer records allegedly linked to TNI systems
โ–ช๏ธ Full names and military identification number fields
โ–ช๏ธ Rank, corps/branch, unit, and job title information
โ–ช๏ธ Date of birth, age, gender, and religion fields
โ–ช๏ธ Current position assignment and rank promotion dates
โ–ช๏ธ Military education and training classification fields
โ–ช๏ธ Employment status, office address, and home address fields
โ–ช๏ธ Phone number fields tied to personnel records

Potential impact:

The exposed data could create serious operational security, impersonation, phishing, social engineering, and personnel privacy risks for military officers and defense-related institutions.

Status:

Unverified underground forum claim. The actor posted a field breakdown and sample reference, with download links shared through external channels.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
๐ŸšจX-HAVEN exploit service advertised: silent document payload execution tool promoted on underground forum

A threat actor is advertising X-HAVEN, a malicious exploit service claiming to support silent payload execution through weaponized document formats.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Service: X-HAVEN
Sector: Malware / Exploit Sales / Cybercrime Infrastructure
Incident: Exploit Service Advertisement
Exposure: DOC, XLS, and PDF payload delivery
Actor: TheStrain
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s being advertised:

โ–ช๏ธ Silent document-based payload execution
โ–ช๏ธ Claimed Microsoft Office compatibility across multiple versions
โ–ช๏ธ Antivirus and Windows Defender bypass claims
โ–ช๏ธ Direct attachment delivery for email-based campaigns
โ–ช๏ธ Payload support for multiple executable and script formats

Potential impact:

The advertised service could enable malware delivery, phishing campaigns, credential theft, unauthorized access, and compromise of personal or enterprise systems.

Status:

Underground forum advertisement. The seller posted promotional material describing exploit capabilities, payment terms, and support channels.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿ˜1
๐Ÿšจ Domain and Telegram takedown service offered against fraudulent and illegal resources
๐Ÿ˜ญ3
๐Ÿšจ๐Ÿ‡ฐ๐Ÿ‡ผ Kuwait Ministry of Electricity allegedly breached: employee database leaked from government ministry records

A threat actor claims to have leaked employee data tied to Kuwaitโ€™s Ministry of Electricity, the government ministry responsible for electricity-related public services and infrastructure.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Kuwait Ministry of Electricity
Sector: Government / Energy / Public Utilities
Incident: Database Leak
Exposure: Ministry employee records
Actor: Revesky
Country: Kuwait
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Employee records allegedly linked to Kuwaitโ€™s Ministry of Electricity
โ–ช๏ธ Full name fields
โ–ช๏ธ Job status information
โ–ช๏ธ Phone number fields
โ–ช๏ธ Phone-related metadata
โ–ช๏ธ Job location data
โ–ช๏ธ Full dataset allegedly hidden behind forum access

Potential impact:

The exposed data could be used for phishing, impersonation, targeted social engineering, and fraud attempts against ministry employees and public-sector contacts.

Status:

Unverified underground forum claim.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡ซ๐Ÿ‡ท ARGUS Lookup allegedly advertised: French dataleak lookup, geolocation, and spyware-style intelligence platform promoted on underground forum

A threat actor is advertising ARGUS Lookup, a French-focused doxxing and spyware-style intelligence platform claiming to combine leaked databases, identity lookup, geolocation, facial recognition, and account correlation features.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Service: ARGUS Lookup
Sector: Doxxing Tools / Spyware / Cybercrime Intelligence
Incident: Spyware & Dataleak Service Advertisement
Exposure: French dataleak lookup and real-time geolocation tools
Actor: near2tlg
Country: France
Price: $400 for 7 days / $1,300 for 30 days / $3,500 lifetime
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s being advertised:

โ–ช๏ธ French dataleak lookup covering records from 2010โ€“2026
โ–ช๏ธ Identity, contact, address, and account correlation features
โ–ช๏ธ SS7 and HLR/VLR-style geolocation lookup claims
โ–ช๏ธ Facial recognition and profile-matching capabilities
โ–ช๏ธ Database access tied to financial, government, insurance, and telecom-style sources
โ–ช๏ธ Stealer, URL password, and combo lookup/checking functionality
โ–ช๏ธ Premium subscription tiers with cryptocurrency payment options

Potential impact:

The advertised service could enable doxxing, stalking, identity theft, SIM-swap targeting, phishing, financial fraud, and targeted surveillance against French individuals.

Status:

Underground forum advertisement. The actor posted a dashboard preview, listed claimed lookup capabilities, and included premium pricing tiers for access.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿ‡ช๐Ÿ‡บ Europol Press Release
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

EU targets Iranโ€™s Revolutionary Guard propaganda ecosystem in an online crackdown

Full Press Release โ†’ europol.europa.eu

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
๐Ÿ•ต๏ธ Dark Web Informer โ€ข Europol Monitor

Note: Europol articles that are not Cyber related will be removed manually.
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: Chanhassen Dinner Theatres
Domain: chanhassendt.com

Country: ๐Ÿ‡บ๐Ÿ‡ธ US
Date: May 16th, 2026

Summary:
Chanhassen Dinner Theatres was forced to temporarily suspend certain performances due to a cyberattack detected on its computer network, which prompted the theater to take its systems offline as a precautionary measure. The organization is working diligently with external experts to restore services and reschedule the affected performances. Ticketholders for the affected shows will be contacted directly by phone or email for further details.

Source: https://bringmethenews.com/minnesota-lifestyle/chanhassen-dinner-theatres-says-cyber-attack-may-affect-upcoming-performances
๐ŸšจGoogle-signed SMTP mailer allegedly advertised: Gmail relay-based mailer service promoted on underground forum

A threat actor is advertising a โ€œGmail Mailerโ€ service, claiming it can send emails through a Google.com-signed SMTP relay with high inbox placement and customizable templates.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Service: Gmail Mailer
Sector: Phishing Infrastructure / Spam Services / Cybercrime Tools
Incident: Mailer Service Advertisement
Exposure: Google.com-signed SMTP relay claims
Actor: Anon
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s being advertised:

โ–ช๏ธ Google.com-signed SMTP mailer service
โ–ช๏ธ Claims of direct Google relay delivery
โ–ช๏ธ High inbox placement claims
โ–ช๏ธ Multiple templates and custom input options
โ–ช๏ธ Test access offered by the seller

Potential impact:

The advertised service could be used for phishing, spam campaigns, credential theft, business email compromise attempts, and impersonation of trusted email infrastructure.

Status:

Underground forum sale listing. The actor claims they are not selling the source code and are offering limited access to the mailer service.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations