โผ๏ธ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 18th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-18th-2026/
Title: Daily Dose of Dark Web Informer - May 18th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-18th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 18th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
๐จ๐ณ๐ฌ General Directorate of Public Accounting and Treasury of Nigeria allegedly breached: 70GB of government financial and employee data leaked
A threat actor claims to have leaked data tied to the General Directorate of Public Accounting and Treasury of Nigeria (DGCPT) following an alleged ransomware-related cyberattack.
โโโโโโโโโโโโโโโโโโโโ
Target: General Directorate of Public Accounting and Treasury of Nigeria
Sector: Government / Public Finance / Treasury
Incident: Data Breach / Ransomware Leak
Exposure: 70GB+
Actor: 0xSec
Country: Nigeria
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Government employee records allegedly linked to DGCPT systems
โช๏ธ Employee ID, first name, and last name fields
โช๏ธ Phone number and contact-related data
โช๏ธ Bank, branch, and account-related fields
โช๏ธ Additional financial identifiers referenced in SQL files
โช๏ธ Multiple SQL database files containing employee and treasury-related records
Potential impact:
The exposed data could be used for identity theft, payroll fraud, banking fraud, phishing, impersonation, and targeted social engineering against government employees and financial administration contacts.
Status:
Unverified underground forum claim. The actor states the archive contains more than 70GB of exfiltrated data and references multiple SQL files.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked data tied to the General Directorate of Public Accounting and Treasury of Nigeria (DGCPT) following an alleged ransomware-related cyberattack.
โโโโโโโโโโโโโโโโโโโโ
Target: General Directorate of Public Accounting and Treasury of Nigeria
Sector: Government / Public Finance / Treasury
Incident: Data Breach / Ransomware Leak
Exposure: 70GB+
Actor: 0xSec
Country: Nigeria
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Government employee records allegedly linked to DGCPT systems
โช๏ธ Employee ID, first name, and last name fields
โช๏ธ Phone number and contact-related data
โช๏ธ Bank, branch, and account-related fields
โช๏ธ Additional financial identifiers referenced in SQL files
โช๏ธ Multiple SQL database files containing employee and treasury-related records
Potential impact:
The exposed data could be used for identity theft, payroll fraud, banking fraud, phishing, impersonation, and targeted social engineering against government employees and financial administration contacts.
Status:
Unverified underground forum claim. The actor states the archive contains more than 70GB of exfiltrated data and references multiple SQL files.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ง๐ท Econet Editora allegedly breached: 163GB full database advertised for sale from Brazilian education publishing platform
A threat actor claims to be selling a full database tied to Econet Editora, a Brazilian publishing platform focused on educational content, books, digital resources, and learning materials for students and educators.
โโโโโโโโโโโโโโโโโโโโ
Target: Econet Editora
Sector: Education / Publishing / Digital Learning
Incident: Database Leak / Data Sale
Exposure: 163GB
Actor: [Citizen] joaoestrella
Country: Brazil
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Full database allegedly linked to Econet Editora
โช๏ธ Email address fields
โช๏ธ Plaintext password claims
โช๏ธ User/account-related database records
โช๏ธ Platform and publishing service data
โช๏ธ Database and table listings shared as proof
โช๏ธ Additional unspecified internal records referenced by the actor
Potential impact:
The exposed data could be used for credential stuffing, account takeover, phishing, identity theft, and targeted scams against students, educators, and platform users.
Status:
Unverified underground forum sale listing. The actor claims the database totals 163GB and includes emails, plaintext passwords, and additional database content.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to be selling a full database tied to Econet Editora, a Brazilian publishing platform focused on educational content, books, digital resources, and learning materials for students and educators.
โโโโโโโโโโโโโโโโโโโโ
Target: Econet Editora
Sector: Education / Publishing / Digital Learning
Incident: Database Leak / Data Sale
Exposure: 163GB
Actor: [Citizen] joaoestrella
Country: Brazil
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Full database allegedly linked to Econet Editora
โช๏ธ Email address fields
โช๏ธ Plaintext password claims
โช๏ธ User/account-related database records
โช๏ธ Platform and publishing service data
โช๏ธ Database and table listings shared as proof
โช๏ธ Additional unspecified internal records referenced by the actor
Potential impact:
The exposed data could be used for credential stuffing, account takeover, phishing, identity theft, and targeted scams against students, educators, and platform users.
Status:
Unverified underground forum sale listing. The actor claims the database totals 163GB and includes emails, plaintext passwords, and additional database content.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Forwarded from FBI Watchdog Alerts by Dark Web Informer
โ ๏ธ FBI Watchdog - WHOIS Change โ ๏ธ
๐ DarkWebInformer.com - Cyber Threat Intelligence
Domain: breached.st
Record Type: WHOIS Change
Time Detected: 2026-05-19 01:23:42 UTC
Previous Records:
New Records:
๐ DarkWebInformer.com - Cyber Threat Intelligence
Domain: breached.st
Record Type: WHOIS Change
Time Detected: 2026-05-19 01:23:42 UTC
Previous Records:
status: ['ok']
New Records:
status: ['ok'] โ ['clienttransferprohibited']
๐2
Hackers laying it on thick...
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐บ๐ธ Peetโs Coffee allegedly breached: 115K customer records exposed from U.S. coffee retail database
A threat actor claims to have leaked part of a customer database tied to Peetโs Coffee, a U.S. coffee retailer and cafรฉ chain known for its specialty coffee products and retail locations.
โโโโโโโโโโโโโโโโโโโโ
Target: Peetโs Coffee
Sector: Retail / Food & Beverage / Customer Data
Incident: Database Leak
Exposure: 115,000 records / 120MB
Actor: zSenior
Country: United States
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Peetโs Coffee
โช๏ธ First name and last name fields
โช๏ธ Primary email address fields
โช๏ธ Primary phone number fields
โช๏ธ Full address and street address fields
โช๏ธ City, state, and ZIP code records
โช๏ธ Customer profile and contact metadata
โช๏ธ Partial sample data shared through the forum thread
Potential impact:
The exposed data could be used for phishing, customer impersonation, loyalty fraud, account targeting, and retail scam campaigns against Peetโs Coffee customers.
Status:
Unverified underground forum claim. The actor posted sample customer records and claims a 5K-record partial leak is available through hidden forum content.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked part of a customer database tied to Peetโs Coffee, a U.S. coffee retailer and cafรฉ chain known for its specialty coffee products and retail locations.
โโโโโโโโโโโโโโโโโโโโ
Target: Peetโs Coffee
Sector: Retail / Food & Beverage / Customer Data
Incident: Database Leak
Exposure: 115,000 records / 120MB
Actor: zSenior
Country: United States
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Peetโs Coffee
โช๏ธ First name and last name fields
โช๏ธ Primary email address fields
โช๏ธ Primary phone number fields
โช๏ธ Full address and street address fields
โช๏ธ City, state, and ZIP code records
โช๏ธ Customer profile and contact metadata
โช๏ธ Partial sample data shared through the forum thread
Potential impact:
The exposed data could be used for phishing, customer impersonation, loyalty fraud, account targeting, and retail scam campaigns against Peetโs Coffee customers.
Status:
Unverified underground forum claim. The actor posted sample customer records and claims a 5K-record partial leak is available through hidden forum content.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฒ๐ฝ Escuela Normal Experimental allegedly breached: 3,414 student/application records exposed from Mexican school database
A threat actor claims to have leaked a database tied to Escuela Normal Experimental in Mexico, allegedly exposing student and application-related records from an education system.
โโโโโโโโโโโโโโโโโโโโ
Target: Escuela Normal Experimental
Sector: Education / School Administration
Incident: Database Leak
Exposure: 3,414 records
Actor: Z3r00 and MagoSpeak
Country: Mexico
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student and application records allegedly linked to the school
โช๏ธ Application folio and request status fields
โช๏ธ CURP identity-related fields
โช๏ธ Names, paternal surnames, and maternal surnames
โช๏ธ Age, birth date, gender, nationality, and birth entity fields
โช๏ธ Email, fixed phone, and mobile phone fields
โช๏ธ Address and municipality-related records
โช๏ธ School file and subsystem-related administrative fields
Potential impact:
The exposed data could be used for identity theft, phishing, student impersonation, education fraud, and targeted social engineering against applicants, students, and school staff.
Status:
Unverified underground forum claim. The actor posted a field list and claims the database is available through an external file-hosting link.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a database tied to Escuela Normal Experimental in Mexico, allegedly exposing student and application-related records from an education system.
โโโโโโโโโโโโโโโโโโโโ
Target: Escuela Normal Experimental
Sector: Education / School Administration
Incident: Database Leak
Exposure: 3,414 records
Actor: Z3r00 and MagoSpeak
Country: Mexico
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student and application records allegedly linked to the school
โช๏ธ Application folio and request status fields
โช๏ธ CURP identity-related fields
โช๏ธ Names, paternal surnames, and maternal surnames
โช๏ธ Age, birth date, gender, nationality, and birth entity fields
โช๏ธ Email, fixed phone, and mobile phone fields
โช๏ธ Address and municipality-related records
โช๏ธ School file and subsystem-related administrative fields
Potential impact:
The exposed data could be used for identity theft, phishing, student impersonation, education fraud, and targeted social engineering against applicants, students, and school staff.
Status:
Unverified underground forum claim. The actor posted a field list and claims the database is available through an external file-hosting link.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฒ๐ฝ Instituto Tecnolรณgico del Istmo allegedly breached: 3,640 student/application records exposed from Oaxaca education database
A threat actor claims to have leaked a database tied to Instituto Tecnolรณgico del Istmo in Oaxaca, Mexico, allegedly exposing student and application-related records from an education system.
โโโโโโโโโโโโโโโโโโโโ
Target: Instituto Tecnolรณgico del Istmo
Sector: Education / Higher Education / School Administration
Incident: Database Leak
Exposure: 3,640 records
Actor: Z3r00 and MagoSpeak
Country: Mexico
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student and application records allegedly linked to the institute
โช๏ธ Application folio and request status fields
โช๏ธ CURP identity-related fields
โช๏ธ Names, paternal surnames, and maternal surnames
โช๏ธ Age, birth date, gender, nationality, and birth entity fields
โช๏ธ Email, fixed phone, and mobile phone fields
โช๏ธ Address, state, and municipality-related records
โช๏ธ Administrative school system fields tied to application workflows
Potential impact:
The exposed data could be used for identity theft, phishing, student impersonation, education fraud, and targeted social engineering against applicants, students, and school staff.
Status:
Unverified underground forum claim. The actor posted a field list and claims the database is available through an external file-hosting link.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a database tied to Instituto Tecnolรณgico del Istmo in Oaxaca, Mexico, allegedly exposing student and application-related records from an education system.
โโโโโโโโโโโโโโโโโโโโ
Target: Instituto Tecnolรณgico del Istmo
Sector: Education / Higher Education / School Administration
Incident: Database Leak
Exposure: 3,640 records
Actor: Z3r00 and MagoSpeak
Country: Mexico
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student and application records allegedly linked to the institute
โช๏ธ Application folio and request status fields
โช๏ธ CURP identity-related fields
โช๏ธ Names, paternal surnames, and maternal surnames
โช๏ธ Age, birth date, gender, nationality, and birth entity fields
โช๏ธ Email, fixed phone, and mobile phone fields
โช๏ธ Address, state, and municipality-related records
โช๏ธ Administrative school system fields tied to application workflows
Potential impact:
The exposed data could be used for identity theft, phishing, student impersonation, education fraud, and targeted social engineering against applicants, students, and school staff.
Status:
Unverified underground forum claim. The actor posted a field list and claims the database is available through an external file-hosting link.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จDeath Stealer 2026 advertised: information-stealing malware post shared on underground forum
A forum user is advertising โDeath Stealer 2026,โ described as an information-stealing malware concept associated with credential theft, browser data collection, and unauthorized extraction of sensitive user data.
โโโโโโโโโโโโโโโโโโโโ
Service: Death Stealer 2026
Sector: Malware / Info-Stealer / Cybercrime Tools
Incident: Malware Advertisement
Exposure: Credential theft and browser data collection tool
Actor: Jake Elliott
Country: Unknown / Global
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs being advertised:
โช๏ธ Information-stealing malware branded as โDeath Stealer 2026โ
โช๏ธ Credential and browser data targeting claims
โช๏ธ Sensitive application and system data collection references
โช๏ธ External server communication for stolen data transfer
โช๏ธ Malware behavior framed around stealth and detection avoidance
โช๏ธ VirusTotal scan result section referenced in the post
โช๏ธ Download link section included by the actor
Potential impact:
The advertised tool could be used for credential theft, account takeover, financial fraud, identity theft, and broader compromise of personal or enterprise systems.
Status:
Underground forum advertisement. The post presents a short malware summary, key capabilities, scan-result references, and a download section.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A forum user is advertising โDeath Stealer 2026,โ described as an information-stealing malware concept associated with credential theft, browser data collection, and unauthorized extraction of sensitive user data.
โโโโโโโโโโโโโโโโโโโโ
Service: Death Stealer 2026
Sector: Malware / Info-Stealer / Cybercrime Tools
Incident: Malware Advertisement
Exposure: Credential theft and browser data collection tool
Actor: Jake Elliott
Country: Unknown / Global
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs being advertised:
โช๏ธ Information-stealing malware branded as โDeath Stealer 2026โ
โช๏ธ Credential and browser data targeting claims
โช๏ธ Sensitive application and system data collection references
โช๏ธ External server communication for stolen data transfer
โช๏ธ Malware behavior framed around stealth and detection avoidance
โช๏ธ VirusTotal scan result section referenced in the post
โช๏ธ Download link section included by the actor
Potential impact:
The advertised tool could be used for credential theft, account takeover, financial fraud, identity theft, and broader compromise of personal or enterprise systems.
Status:
Underground forum advertisement. The post presents a short malware summary, key capabilities, scan-result references, and a download section.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โผ๏ธ New Dark Web Informer Blog Post!
Title: Nirvasa allegedly breached: 3.5K healthcare platform user records advertised for sale
Link: https://darkwebinformer.com/nirvasa-allegedly-breached-3-5k-healthcare-platform-user-records-advertised-for-sale/
Title: Nirvasa allegedly breached: 3.5K healthcare platform user records advertised for sale
Link: https://darkwebinformer.com/nirvasa-allegedly-breached-3-5k-healthcare-platform-user-records-advertised-for-sale/
Dark Web Informer
Nirvasa allegedly breached: 3.5K healthcare platform user records advertised for sale
A threat actor claims to be selling data tied to Nirvasa, an Indian digital healthcare platform focused on primary care, personalized treatment, and patient services.
โผ๏ธ New Dark Web Informer Blog Post!
Title: Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
Link: https://darkwebinformer.com/watiqa-ma-allegedly-breached-695k-moroccan-civil-document-platform-records-exposed/
Title: Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
Link: https://darkwebinformer.com/watiqa-ma-allegedly-breached-695k-moroccan-civil-document-platform-records-exposed/
Dark Web Informer
Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
A threat actor claims to have leaked a full database dump tied to Watiqa.ma, Moroccoโs government electronic platform for requesting civil status documents.
๐จ๐ซ๐ท Lagrange Vacances allegedly breached: 44K holiday rental reservation records exposed from French travel booking database
A threat actor claims to have leaked a database tied to Lagrange Vacances, a French holiday rental and vacation accommodation provider offering apartments, holiday homes, and leisure stays across France and Europe.
โโโโโโโโโโโโโโโโโโโโ
Target: Lagrange Vacances
Sector: Hospitality / Travel / Holiday Rentals
Incident: Database Leak
Exposure: 44K records / 35MB
Actor: ChimeraZ
Country: France
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Reservation records allegedly linked to Lagrange Vacances bookings
โช๏ธ Customer and participant identity fields
โช๏ธ Booking references and reservation IDs
โช๏ธ Vendor, lodging, and product-related records
โช๏ธ Guest count fields including adults and children
โช๏ธ Stay dates, arrival/departure times, and accommodation details
โช๏ธ Pricing, commission, fees, and payment-related booking metadata
โช๏ธ Customer comments and special booking notes
Potential impact:
The exposed data could be used for booking impersonation, targeted phishing, travel fraud, customer scams, and social engineering against travelers, guests, and booking partners.
Status:
Unverified underground forum claim. The actor posted structured JSON reservation samples and claims the download links are hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a database tied to Lagrange Vacances, a French holiday rental and vacation accommodation provider offering apartments, holiday homes, and leisure stays across France and Europe.
โโโโโโโโโโโโโโโโโโโโ
Target: Lagrange Vacances
Sector: Hospitality / Travel / Holiday Rentals
Incident: Database Leak
Exposure: 44K records / 35MB
Actor: ChimeraZ
Country: France
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Reservation records allegedly linked to Lagrange Vacances bookings
โช๏ธ Customer and participant identity fields
โช๏ธ Booking references and reservation IDs
โช๏ธ Vendor, lodging, and product-related records
โช๏ธ Guest count fields including adults and children
โช๏ธ Stay dates, arrival/departure times, and accommodation details
โช๏ธ Pricing, commission, fees, and payment-related booking metadata
โช๏ธ Customer comments and special booking notes
Potential impact:
The exposed data could be used for booking impersonation, targeted phishing, travel fraud, customer scams, and social engineering against travelers, guests, and booking partners.
Status:
Unverified underground forum claim. The actor posted structured JSON reservation samples and claims the download links are hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
๐จ๐จ๐ฎ Unknown Ivory Coast ID dataset advertised: 10.6K ID document files offered for sale
A threat actor claims to be selling an unidentified dataset containing Ivory Coast identity document images, including front-side ID images, back-side ID images, and selfie verification photos.
โโโโโโโโโโโโโโโโโโโโ
Target: Unknown Ivory Coast ID dataset
Sector: Identity Documents / KYC Data
Incident: Data Sale
Exposure: 32,009 files / 2.10GB
Actor: azrekx
Country: Cรดte dโIvoire
Price: $5,000 full dataset / $1 per record
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Ivory Coast ID document images
โช๏ธ Front and back ID card files
โช๏ธ Selfie verification images
โช๏ธ KYC-style identity verification records
โช๏ธ Personal identity document data
โช๏ธ Image archive samples allegedly shared through external channels
Potential impact:
The exposed documents could be used for identity theft, account fraud, KYC bypass, impersonation, and financial scams involving affected individuals.
Status:
Unverified underground forum sale listing. The actor claims the dataset was found on a server, continues to grow, and may not be tied to a known source organization.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to be selling an unidentified dataset containing Ivory Coast identity document images, including front-side ID images, back-side ID images, and selfie verification photos.
โโโโโโโโโโโโโโโโโโโโ
Target: Unknown Ivory Coast ID dataset
Sector: Identity Documents / KYC Data
Incident: Data Sale
Exposure: 32,009 files / 2.10GB
Actor: azrekx
Country: Cรดte dโIvoire
Price: $5,000 full dataset / $1 per record
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Ivory Coast ID document images
โช๏ธ Front and back ID card files
โช๏ธ Selfie verification images
โช๏ธ KYC-style identity verification records
โช๏ธ Personal identity document data
โช๏ธ Image archive samples allegedly shared through external channels
Potential impact:
The exposed documents could be used for identity theft, account fraud, KYC bypass, impersonation, and financial scams involving affected individuals.
Status:
Unverified underground forum sale listing. The actor claims the dataset was found on a server, continues to grow, and may not be tied to a known source organization.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฆ๐ช Bayut allegedly breached: 986K real estate customer records and identity documents exposed
A threat actor claims to have leaked a large dataset allegedly tied to Bayut, one of the UAEโs major real estate platforms.
โโโโโโโโโโโโโโโโโโโโ
Target: Bayut
Sector: Real Estate / Property Technology / Customer Data
Incident: Data Leak
Exposure: 986,506 records
Actor: attacker_company
Country: United Arab Emirates
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Bayut
โช๏ธ Full names and login/user identifier fields
โช๏ธ Password-related values
โช๏ธ Phone numbers, WhatsApp contact fields, and email addresses
โช๏ธ IP address logs and location classification fields
โช๏ธ Physical address and ZIP/postal data
โช๏ธ Passport, Golden Card, and ID document images
โช๏ธ Title deed and property ownership document samples
Potential impact:
The exposed data could be used for identity theft, real estate fraud, account takeover, phishing, property-owner impersonation, and targeted scams against Bayut users and customers.
Status:
Unverified underground forum claim. The actor posted sample identity documents, property ownership document previews, and claims additional personal information data is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a large dataset allegedly tied to Bayut, one of the UAEโs major real estate platforms.
โโโโโโโโโโโโโโโโโโโโ
Target: Bayut
Sector: Real Estate / Property Technology / Customer Data
Incident: Data Leak
Exposure: 986,506 records
Actor: attacker_company
Country: United Arab Emirates
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Bayut
โช๏ธ Full names and login/user identifier fields
โช๏ธ Password-related values
โช๏ธ Phone numbers, WhatsApp contact fields, and email addresses
โช๏ธ IP address logs and location classification fields
โช๏ธ Physical address and ZIP/postal data
โช๏ธ Passport, Golden Card, and ID document images
โช๏ธ Title deed and property ownership document samples
Potential impact:
The exposed data could be used for identity theft, real estate fraud, account takeover, phishing, property-owner impersonation, and targeted scams against Bayut users and customers.
Status:
Unverified underground forum claim. The actor posted sample identity documents, property ownership document previews, and claims additional personal information data is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ง๐ท Speedio allegedly breached: 62M Brazilian B2B marketing records exposed
A threat actor claims to have leaked a large B2B marketing database tied to Speedio, a Brazilian business intelligence and sales prospecting platform.
โโโโโโโโโโโโโโโโโโโโ
Target: Speedio
Sector: B2B Marketing / Sales Intelligence / Business Data
Incident: Database Leak
Exposure: 62M lines / 27,652,184 unique emails
Actor: Claude
Country: Brazil
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Brazilian company and business profile records
โช๏ธ Legal names and trading names
โช๏ธ Company identifiers and MongoDB-related record IDs
โช๏ธ Business status, legal nature, and founding date fields
โช๏ธ Primary and secondary economic activity classifications
โช๏ธ Company size, capital amount, and tax regime metadata
โช๏ธ Email addresses, phone numbers, and WhatsApp contact fields
โช๏ธ Address and WhatsApp validation-related data
Potential impact:
The exposed data could be used for B2B phishing, business impersonation, spam campaigns, targeted scams, lead fraud, and social engineering against Brazilian companies and contacts.
Status:
Unverified underground forum claim. The actor posted structured JSON samples and claims the dataset contains 62M total lines, including more than 27.6M unique email addresses.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a large B2B marketing database tied to Speedio, a Brazilian business intelligence and sales prospecting platform.
โโโโโโโโโโโโโโโโโโโโ
Target: Speedio
Sector: B2B Marketing / Sales Intelligence / Business Data
Incident: Database Leak
Exposure: 62M lines / 27,652,184 unique emails
Actor: Claude
Country: Brazil
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Brazilian company and business profile records
โช๏ธ Legal names and trading names
โช๏ธ Company identifiers and MongoDB-related record IDs
โช๏ธ Business status, legal nature, and founding date fields
โช๏ธ Primary and secondary economic activity classifications
โช๏ธ Company size, capital amount, and tax regime metadata
โช๏ธ Email addresses, phone numbers, and WhatsApp contact fields
โช๏ธ Address and WhatsApp validation-related data
Potential impact:
The exposed data could be used for B2B phishing, business impersonation, spam campaigns, targeted scams, lead fraud, and social engineering against Brazilian companies and contacts.
Status:
Unverified underground forum claim. The actor posted structured JSON samples and claims the dataset contains 62M total lines, including more than 27.6M unique email addresses.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ฅ1
โผ๏ธ DOJ Press Release
โโโโโโโโโโโโโโโโโโโโโ
Justice Department Notifies Washington of Investigation into Whether Housing Biological Men in Womenโs Prison Violates Constitution
Full Press Release โ justice.gov
โโโโโโโโโโโโโโโโโโโโโ
๐ต๏ธ Dark Web Informer โข DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
โโโโโโโโโโโโโโโโโโโโโ
Justice Department Notifies Washington of Investigation into Whether Housing Biological Men in Womenโs Prison Violates Constitution
Full Press Release โ justice.gov
โโโโโโโโโโโโโโโโโโโโโ
๐ต๏ธ Dark Web Informer โข DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
Justice Department Notifies Washington of Investigation into Whether
Today, the Justice Department notified Washington Governor Bob Ferguson of the initiation of a federal investigation into Washingtonโs practice of housing men in its womenโs prison. The Justice Department will investigate whether Washington engages in a patternโฆ
๐1๐1