๐Ÿ”ช Slice For Life - Part 2 ๐Ÿ”ช
3.09K subscribers
684 photos
17 videos
494 links
Download Telegram
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: Chanhassen Dinner Theatres
Domain: chanhassendt.com

Country: ๐Ÿ‡บ๐Ÿ‡ธ US
Date: May 16th, 2026

Summary:
Chanhassen Dinner Theatres was forced to temporarily suspend certain performances due to a cyberattack detected on its computer network, which prompted the theater to take its systems offline as a precautionary measure. The organization is working diligently with external experts to restore services and reschedule the affected performances. Ticketholders for the affected shows will be contacted directly by phone or email for further details.

Source: https://bringmethenews.com/minnesota-lifestyle/chanhassen-dinner-theatres-says-cyber-attack-may-affect-upcoming-performances
๐ŸšจGoogle-signed SMTP mailer allegedly advertised: Gmail relay-based mailer service promoted on underground forum

A threat actor is advertising a โ€œGmail Mailerโ€ service, claiming it can send emails through a Google.com-signed SMTP relay with high inbox placement and customizable templates.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Service: Gmail Mailer
Sector: Phishing Infrastructure / Spam Services / Cybercrime Tools
Incident: Mailer Service Advertisement
Exposure: Google.com-signed SMTP relay claims
Actor: Anon
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s being advertised:

โ–ช๏ธ Google.com-signed SMTP mailer service
โ–ช๏ธ Claims of direct Google relay delivery
โ–ช๏ธ High inbox placement claims
โ–ช๏ธ Multiple templates and custom input options
โ–ช๏ธ Test access offered by the seller

Potential impact:

The advertised service could be used for phishing, spam campaigns, credential theft, business email compromise attempts, and impersonation of trusted email infrastructure.

Status:

Underground forum sale listing. The actor claims they are not selling the source code and are offering limited access to the mailer service.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ŸšจXIA Stealer advertised: DLL-based information stealer promoted as โ€œfully undetectedโ€ on underground forum

A threat actor is advertising XIA, a DLL-based information stealer claiming to target modern Windows systems while avoiding detection during scan time and runtime.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Service: XIA Stealer
Sector: Malware / Info-Stealer / Cybercrime Tools
Incident: Malware Service Advertisement
Exposure: Credential theft and browser data collection tool
Actor: kandricklamar
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s being advertised:

โ–ช๏ธ DLL-based information stealer under 500KB
โ–ช๏ธ Browser cookie, login, and autofill data collection claims
โ–ช๏ธ Credit card and wallet-related data theft capabilities
โ–ช๏ธ Crypto wallet extension targeting claims
โ–ช๏ธ File collection from desktop and text files
โ–ช๏ธ Persistence, stealth, and anti-analysis features
โ–ช๏ธ Discord webhook logging and Windows compatibility claims

Potential impact:

The advertised tool could be used for credential theft, crypto wallet compromise, account takeover, financial fraud, and broader malware campaigns against Windows users.

Status:

Underground forum advertisement. The actor posted a feature list and directs users to an external channel for more information and showcase material.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡ซ๐Ÿ‡ท ManoMano allegedly breached: 38.7M user and ticket records advertised for sale from home improvement marketplace database

A threat actor claims to be selling a database tied to ManoMano, a European online marketplace specializing in DIY, home improvement, gardening, and renovation products.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: ManoMano
Sector: E-commerce / Home Improvement / Marketplace
Incident: Database Leak / Data Sale
Exposure: 38,773,441 total lines across users and tickets datasets
Actor: Saikaa
Country: France
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ User database records allegedly linked to ManoMano
โ–ช๏ธ Customer account and marketplace profile data
โ–ช๏ธ Ticket and support-related records
โ–ช๏ธ Attachment folder containing uploaded files
โ–ช๏ธ Large-scale JSON datasets for users and tickets
โ–ช๏ธ Sample data references shared by the actor

Potential impact:

The exposed data could be used for phishing, account impersonation, customer support scams, marketplace fraud, and targeted social engineering against ManoMano users and sellers.

Status:

Unverified underground forum sale listing. The actor claims the files include 37,838,030 user lines, 935,411 ticket lines, and 13,522 attachment files.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
The API daily limit has been changed from 50 requests daily to 150 requests. This has been reflected on the necessary pages.

If you have already used 40 requests for the day you now have 110 requests remaining.

An optional addon is available for those who need higher limits.

Daily limit resets at 12am UTC.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค2
๐Ÿšจ๐Ÿ‡บ๐Ÿ‡ธ Venture Yours allegedly breached: 70K vacation rental management files and KYC/PII records exposed

A threat actor claims to have leaked part of a customer database tied to Venture Yours, a vacation rental management platform handling rental agreements, booking details, customer communications, and property-related operations.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Venture Yours
Sector: Vacation Rental Management / Property Technology
Incident: Database Leak
Exposure: 70,000+ files / 64GB
Actor: zSenior
Date: 17/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Customer PII records allegedly linked to vacation rental management operations
โ–ช๏ธ Names, emails, phone numbers, roles, and address fields
โ–ช๏ธ Property address and rental agreement-related data
โ–ช๏ธ Driver license and KYC document references
โ–ช๏ธ Booking details, contracts, and customer communication logs
โ–ช๏ธ Conversation metadata from customer support systems
โ–ช๏ธ CSV records containing logs and personal information
โ–ช๏ธ File archives containing identity and rental documentation

Potential impact:

The exposed data could be used for identity theft, rental fraud, phishing, customer impersonation, property scams, and targeted social engineering against guests, property owners, and rental managers.

Status:

Unverified underground forum claim. The actor posted CSV samples, support-log previews, and a driver license image as proof.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
.@zachxbt is offering another $10,000 bounty for credible intelligence on the Hong Kong market maker Heisenberg Guru, also known as HSBG, allegedly linked to multiple CEX market manipulation incidents, including $RIVER.

He is considering evidence that may include chat logs, contracts, internal communications, or other verifiable materials.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿ”ฅ1
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: HDFC Asset Management Company
Domain: hdfcfund.com

Country: ๐Ÿ‡ฎ๐Ÿ‡ณ IN
Date: May 16th, 2026

Summary:
HDFC Asset Management Company's stock fell 3.8% on Monday following the disclosure of a cyberattack on its IT infrastructure. The incident occurred on May 16 and the company is working to contain it. The stock decline came after the company was notified by an anonymous source. The incident is part of a broader increase in security risks facing India's financial sector.

Source: https://www.freepressjournal.in/business/hdfc-amc-stock-declines-38-after-company-reports-cyberattack-on-it-infra
Quiet day chat. ๐Ÿคทโ€โ™€๏ธ
๐Ÿ”ฅ3
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿšจ Beyond The Dark on Steam is malware, don't download it... or download it if you want malware... but really don't download it!

https://x.com/EricParker/status/2056272797081739452
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ New Ransomware group being monitored: Titan

๐Ÿ‡บ๐Ÿ‡ธ ETM Electromatic
๐Ÿ‡ธ๐Ÿ‡ฌ Quahe Woo & Palmer LLC
๐Ÿ‡ซ๐Ÿ‡ท Groupe CRIT SA
๐Ÿ‡น๐Ÿ‡ณ CRIT Tunisie
๐Ÿ‡บ๐Ÿ‡ธ DFI America
๐Ÿ‡ฎ๐Ÿ‡น Abp Autoricambi
๐Ÿ‡ฒ๐Ÿ‡ฝ Mezta Corporativo
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿ˜1
๐Ÿšจ๐Ÿ‡ซ๐Ÿ‡ท MediaVacances allegedly breached: 256K invoice and holiday rental records exposed from French vacation booking platform

A threat actor claims to have leaked a database tied to MediaVacances, a French holiday rental platform offering apartments, houses, cottages, and short-stay accommodations.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: MediaVacances
Sector: Hospitality / Travel / Holiday Rentals
Incident: Database Leak
Exposure: 256K records / 188MB
Actor: ChimeraZ
Country: France
Date: 18/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Whatโ€™s allegedly included:

โ–ช๏ธ Invoice records allegedly linked to MediaVacances
โ–ช๏ธ Booking and rental listing-related records
โ–ช๏ธ Customer billing and payment reference fields
โ–ช๏ธ Invoice dates, invoice numbers, and transaction text fields
โ–ช๏ธ Accommodation advertising and subscription-related details
โ–ช๏ธ Company registration, VAT, and business identifier references
โ–ช๏ธ Structured JSON records shared as proof of access

Potential impact:

The exposed data could be used for phishing, invoice fraud, booking impersonation, rental scams, and targeted social engineering against customers, hosts, and platform users.

Status:

Unverified underground forum claim. The actor posted JSON invoice samples and claims.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations