โผ๏ธ New Dark Web Informer Blog Post!
Title: Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
Link: https://darkwebinformer.com/watiqa-ma-allegedly-breached-695k-moroccan-civil-document-platform-records-exposed/
Title: Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
Link: https://darkwebinformer.com/watiqa-ma-allegedly-breached-695k-moroccan-civil-document-platform-records-exposed/
Dark Web Informer
Watiqa.ma allegedly breached: 695K Moroccan civil document platform records exposed
A threat actor claims to have leaked a full database dump tied to Watiqa.ma, Moroccoโs government electronic platform for requesting civil status documents.
๐จ๐ซ๐ท Lagrange Vacances allegedly breached: 44K holiday rental reservation records exposed from French travel booking database
A threat actor claims to have leaked a database tied to Lagrange Vacances, a French holiday rental and vacation accommodation provider offering apartments, holiday homes, and leisure stays across France and Europe.
โโโโโโโโโโโโโโโโโโโโ
Target: Lagrange Vacances
Sector: Hospitality / Travel / Holiday Rentals
Incident: Database Leak
Exposure: 44K records / 35MB
Actor: ChimeraZ
Country: France
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Reservation records allegedly linked to Lagrange Vacances bookings
โช๏ธ Customer and participant identity fields
โช๏ธ Booking references and reservation IDs
โช๏ธ Vendor, lodging, and product-related records
โช๏ธ Guest count fields including adults and children
โช๏ธ Stay dates, arrival/departure times, and accommodation details
โช๏ธ Pricing, commission, fees, and payment-related booking metadata
โช๏ธ Customer comments and special booking notes
Potential impact:
The exposed data could be used for booking impersonation, targeted phishing, travel fraud, customer scams, and social engineering against travelers, guests, and booking partners.
Status:
Unverified underground forum claim. The actor posted structured JSON reservation samples and claims the download links are hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a database tied to Lagrange Vacances, a French holiday rental and vacation accommodation provider offering apartments, holiday homes, and leisure stays across France and Europe.
โโโโโโโโโโโโโโโโโโโโ
Target: Lagrange Vacances
Sector: Hospitality / Travel / Holiday Rentals
Incident: Database Leak
Exposure: 44K records / 35MB
Actor: ChimeraZ
Country: France
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Reservation records allegedly linked to Lagrange Vacances bookings
โช๏ธ Customer and participant identity fields
โช๏ธ Booking references and reservation IDs
โช๏ธ Vendor, lodging, and product-related records
โช๏ธ Guest count fields including adults and children
โช๏ธ Stay dates, arrival/departure times, and accommodation details
โช๏ธ Pricing, commission, fees, and payment-related booking metadata
โช๏ธ Customer comments and special booking notes
Potential impact:
The exposed data could be used for booking impersonation, targeted phishing, travel fraud, customer scams, and social engineering against travelers, guests, and booking partners.
Status:
Unverified underground forum claim. The actor posted structured JSON reservation samples and claims the download links are hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
๐จ๐จ๐ฎ Unknown Ivory Coast ID dataset advertised: 10.6K ID document files offered for sale
A threat actor claims to be selling an unidentified dataset containing Ivory Coast identity document images, including front-side ID images, back-side ID images, and selfie verification photos.
โโโโโโโโโโโโโโโโโโโโ
Target: Unknown Ivory Coast ID dataset
Sector: Identity Documents / KYC Data
Incident: Data Sale
Exposure: 32,009 files / 2.10GB
Actor: azrekx
Country: Cรดte dโIvoire
Price: $5,000 full dataset / $1 per record
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Ivory Coast ID document images
โช๏ธ Front and back ID card files
โช๏ธ Selfie verification images
โช๏ธ KYC-style identity verification records
โช๏ธ Personal identity document data
โช๏ธ Image archive samples allegedly shared through external channels
Potential impact:
The exposed documents could be used for identity theft, account fraud, KYC bypass, impersonation, and financial scams involving affected individuals.
Status:
Unverified underground forum sale listing. The actor claims the dataset was found on a server, continues to grow, and may not be tied to a known source organization.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to be selling an unidentified dataset containing Ivory Coast identity document images, including front-side ID images, back-side ID images, and selfie verification photos.
โโโโโโโโโโโโโโโโโโโโ
Target: Unknown Ivory Coast ID dataset
Sector: Identity Documents / KYC Data
Incident: Data Sale
Exposure: 32,009 files / 2.10GB
Actor: azrekx
Country: Cรดte dโIvoire
Price: $5,000 full dataset / $1 per record
Date: 18/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Ivory Coast ID document images
โช๏ธ Front and back ID card files
โช๏ธ Selfie verification images
โช๏ธ KYC-style identity verification records
โช๏ธ Personal identity document data
โช๏ธ Image archive samples allegedly shared through external channels
Potential impact:
The exposed documents could be used for identity theft, account fraud, KYC bypass, impersonation, and financial scams involving affected individuals.
Status:
Unverified underground forum sale listing. The actor claims the dataset was found on a server, continues to grow, and may not be tied to a known source organization.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฆ๐ช Bayut allegedly breached: 986K real estate customer records and identity documents exposed
A threat actor claims to have leaked a large dataset allegedly tied to Bayut, one of the UAEโs major real estate platforms.
โโโโโโโโโโโโโโโโโโโโ
Target: Bayut
Sector: Real Estate / Property Technology / Customer Data
Incident: Data Leak
Exposure: 986,506 records
Actor: attacker_company
Country: United Arab Emirates
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Bayut
โช๏ธ Full names and login/user identifier fields
โช๏ธ Password-related values
โช๏ธ Phone numbers, WhatsApp contact fields, and email addresses
โช๏ธ IP address logs and location classification fields
โช๏ธ Physical address and ZIP/postal data
โช๏ธ Passport, Golden Card, and ID document images
โช๏ธ Title deed and property ownership document samples
Potential impact:
The exposed data could be used for identity theft, real estate fraud, account takeover, phishing, property-owner impersonation, and targeted scams against Bayut users and customers.
Status:
Unverified underground forum claim. The actor posted sample identity documents, property ownership document previews, and claims additional personal information data is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a large dataset allegedly tied to Bayut, one of the UAEโs major real estate platforms.
โโโโโโโโโโโโโโโโโโโโ
Target: Bayut
Sector: Real Estate / Property Technology / Customer Data
Incident: Data Leak
Exposure: 986,506 records
Actor: attacker_company
Country: United Arab Emirates
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Customer records allegedly linked to Bayut
โช๏ธ Full names and login/user identifier fields
โช๏ธ Password-related values
โช๏ธ Phone numbers, WhatsApp contact fields, and email addresses
โช๏ธ IP address logs and location classification fields
โช๏ธ Physical address and ZIP/postal data
โช๏ธ Passport, Golden Card, and ID document images
โช๏ธ Title deed and property ownership document samples
Potential impact:
The exposed data could be used for identity theft, real estate fraud, account takeover, phishing, property-owner impersonation, and targeted scams against Bayut users and customers.
Status:
Unverified underground forum claim. The actor posted sample identity documents, property ownership document previews, and claims additional personal information data is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ง๐ท Speedio allegedly breached: 62M Brazilian B2B marketing records exposed
A threat actor claims to have leaked a large B2B marketing database tied to Speedio, a Brazilian business intelligence and sales prospecting platform.
โโโโโโโโโโโโโโโโโโโโ
Target: Speedio
Sector: B2B Marketing / Sales Intelligence / Business Data
Incident: Database Leak
Exposure: 62M lines / 27,652,184 unique emails
Actor: Claude
Country: Brazil
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Brazilian company and business profile records
โช๏ธ Legal names and trading names
โช๏ธ Company identifiers and MongoDB-related record IDs
โช๏ธ Business status, legal nature, and founding date fields
โช๏ธ Primary and secondary economic activity classifications
โช๏ธ Company size, capital amount, and tax regime metadata
โช๏ธ Email addresses, phone numbers, and WhatsApp contact fields
โช๏ธ Address and WhatsApp validation-related data
Potential impact:
The exposed data could be used for B2B phishing, business impersonation, spam campaigns, targeted scams, lead fraud, and social engineering against Brazilian companies and contacts.
Status:
Unverified underground forum claim. The actor posted structured JSON samples and claims the dataset contains 62M total lines, including more than 27.6M unique email addresses.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a large B2B marketing database tied to Speedio, a Brazilian business intelligence and sales prospecting platform.
โโโโโโโโโโโโโโโโโโโโ
Target: Speedio
Sector: B2B Marketing / Sales Intelligence / Business Data
Incident: Database Leak
Exposure: 62M lines / 27,652,184 unique emails
Actor: Claude
Country: Brazil
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Brazilian company and business profile records
โช๏ธ Legal names and trading names
โช๏ธ Company identifiers and MongoDB-related record IDs
โช๏ธ Business status, legal nature, and founding date fields
โช๏ธ Primary and secondary economic activity classifications
โช๏ธ Company size, capital amount, and tax regime metadata
โช๏ธ Email addresses, phone numbers, and WhatsApp contact fields
โช๏ธ Address and WhatsApp validation-related data
Potential impact:
The exposed data could be used for B2B phishing, business impersonation, spam campaigns, targeted scams, lead fraud, and social engineering against Brazilian companies and contacts.
Status:
Unverified underground forum claim. The actor posted structured JSON samples and claims the dataset contains 62M total lines, including more than 27.6M unique email addresses.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ฅ1
โผ๏ธ DOJ Press Release
โโโโโโโโโโโโโโโโโโโโโ
Justice Department Notifies Washington of Investigation into Whether Housing Biological Men in Womenโs Prison Violates Constitution
Full Press Release โ justice.gov
โโโโโโโโโโโโโโโโโโโโโ
๐ต๏ธ Dark Web Informer โข DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
โโโโโโโโโโโโโโโโโโโโโ
Justice Department Notifies Washington of Investigation into Whether Housing Biological Men in Womenโs Prison Violates Constitution
Full Press Release โ justice.gov
โโโโโโโโโโโโโโโโโโโโโ
๐ต๏ธ Dark Web Informer โข DOJ Monitor
Note: DOJ articles that are not Cyber related will be removed manually.
www.justice.gov
Justice Department Notifies Washington of Investigation into Whether
Today, the Justice Department notified Washington Governor Bob Ferguson of the initiation of a federal investigation into Washingtonโs practice of housing men in its womenโs prison. The Justice Department will investigate whether Washington engages in a patternโฆ
๐1๐1
๐จ๐ง๐ท Brazil Government Health Portal credentials allegedly advertised for sale
A threat actor claims to be selling verified credentials allegedly tied to a Brazil Government Health Portal.
โโโโโโโโโโโโโโโโโโโโ
Target: Brazil Government Health Portal
Sector: Government / Healthcare / Public Health
Incident: Credential Sale
Exposure: Verified credentials
Actor: Florence
Country: Brazil
Price: $200
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Verified credential access allegedly linked to a government health portal
โช๏ธ Government healthcare system login access
โช๏ธ Portal access details offered through forum escrow
โช๏ธ Unknown revenue or access scope
โช๏ธ Buyer-only access with direct forum contact required
โช๏ธ Healthcare-related public-sector system exposure
Potential impact:
The alleged access could create serious risks for unauthorized system access, patient privacy exposure, public health data compromise, phishing, impersonation, and government-sector fraud.
Status:
Unverified underground forum sale listing. The actor claims verified credentials are available for $200 and states the sale is limited to serious buyers through forum escrow.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to be selling verified credentials allegedly tied to a Brazil Government Health Portal.
โโโโโโโโโโโโโโโโโโโโ
Target: Brazil Government Health Portal
Sector: Government / Healthcare / Public Health
Incident: Credential Sale
Exposure: Verified credentials
Actor: Florence
Country: Brazil
Price: $200
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Verified credential access allegedly linked to a government health portal
โช๏ธ Government healthcare system login access
โช๏ธ Portal access details offered through forum escrow
โช๏ธ Unknown revenue or access scope
โช๏ธ Buyer-only access with direct forum contact required
โช๏ธ Healthcare-related public-sector system exposure
Potential impact:
The alleged access could create serious risks for unauthorized system access, patient privacy exposure, public health data compromise, phishing, impersonation, and government-sector fraud.
Status:
Unverified underground forum sale listing. The actor claims verified credentials are available for $200 and states the sale is limited to serious buyers through forum escrow.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ฅ1
โผ๏ธ New Dark Web Informer Blog Post!
Title: Canada Beauty Salon database shared: 1M+ business lead records posted from beauty and cosmetics sector
Link: https://darkwebinformer.com/canada-beauty-salon-database-shared-1m-business-lead-records-posted-from-beauty-and-cosmetics-sector/
Title: Canada Beauty Salon database shared: 1M+ business lead records posted from beauty and cosmetics sector
Link: https://darkwebinformer.com/canada-beauty-salon-database-shared-1m-business-lead-records-posted-from-beauty-and-cosmetics-sector/
Dark Web Informer
Canada Beauty Salon database shared: 1M+ business lead records posted from beauty and cosmetics sector
A forum user claims to have shared a large business lead database focused on beauty salons, cosmetics businesses, and related personal care services across Canada and international regions.
๐จ๐ฉ๐ช Saarland University allegedly breached: 42K student database records leaked
A threat actor claims to have published the full student database tied to Saarland University, a public research university in Germany.
โโโโโโโโโโโโโโโโโโโโ
Target: Saarland University
Sector: Education / Higher Education / Student Records
Incident: Database Leak
Exposure: 42K student records
Actor: StrikerDE
Country: Germany
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student database records allegedly linked to Saarland University
โช๏ธ User and account profile fields
โช๏ธ Names and university email addresses
โช๏ธ Location and country-related fields
โช๏ธ Role or permission-related account metadata
โช๏ธ Student and import-related system records
โช๏ธ Moodle user and course-related file references
โช๏ธ Compressed and uncompressed database files referenced by the actor
Potential impact:
The exposed data could be used for phishing, credential targeting, student impersonation, account takeover attempts, and social engineering against students, faculty, and university staff.
Status:
Unverified underground forum claim. The actor posted sample student records and claims the download is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have published the full student database tied to Saarland University, a public research university in Germany.
โโโโโโโโโโโโโโโโโโโโ
Target: Saarland University
Sector: Education / Higher Education / Student Records
Incident: Database Leak
Exposure: 42K student records
Actor: StrikerDE
Country: Germany
Date: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
Whatโs allegedly included:
โช๏ธ Student database records allegedly linked to Saarland University
โช๏ธ User and account profile fields
โช๏ธ Names and university email addresses
โช๏ธ Location and country-related fields
โช๏ธ Role or permission-related account metadata
โช๏ธ Student and import-related system records
โช๏ธ Moodle user and course-related file references
โช๏ธ Compressed and uncompressed database files referenced by the actor
Potential impact:
The exposed data could be used for phishing, credential targeting, student impersonation, account takeover attempts, and social engineering against students, faculty, and university staff.
Status:
Unverified underground forum claim. The actor posted sample student records and claims the download is hidden behind forum access.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฆ๐ท Ruca Baruk Boxer allegedly leaked: 624K personal and contact records exposed
A threat actor using the alias Databasehooligan claims to be selling a dataset allegedly originating from rucabarukboxer.com.ar, an Argentina-based organization connected to dog owner, dog profile, and service booking records.
The actor claims the dataset includes approximately 624,000 records across contacts, dog profiles, and service bookings.
โโโโโโโโโโโโโโโโโโโโ
Target: Ruca Baruk Boxer
Country: Argentina
Sector: Pet Services / Dog Breeding / Customer Records
Incident Type: Alleged Database Sale
Claimed Exposure: 624K records
Actor: Databasehooligan
Price: $1,200
โโโโโโโโโโโโโโโโโโโโ
According to the post, the dataset allegedly contains customer contact details, emails, phone numbers, addresses, usernames, national ID fields, profile metadata, dog breed and health-related information, vaccination details, microchip numbers, service appointment records, payment status fields, booking notes, feedback notes, and related operational data.
Why it matters:
If authentic, this data could be abused for phishing, identity targeting, customer impersonation, fraud, social engineering, and targeted scams involving pet owners or service customers.
Status:
This remains an unverified underground forum claim. The actor posted sample file links and claims the dataset is available for purchase.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor using the alias Databasehooligan claims to be selling a dataset allegedly originating from rucabarukboxer.com.ar, an Argentina-based organization connected to dog owner, dog profile, and service booking records.
The actor claims the dataset includes approximately 624,000 records across contacts, dog profiles, and service bookings.
โโโโโโโโโโโโโโโโโโโโ
Target: Ruca Baruk Boxer
Country: Argentina
Sector: Pet Services / Dog Breeding / Customer Records
Incident Type: Alleged Database Sale
Claimed Exposure: 624K records
Actor: Databasehooligan
Price: $1,200
โโโโโโโโโโโโโโโโโโโโ
According to the post, the dataset allegedly contains customer contact details, emails, phone numbers, addresses, usernames, national ID fields, profile metadata, dog breed and health-related information, vaccination details, microchip numbers, service appointment records, payment status fields, booking notes, feedback notes, and related operational data.
Why it matters:
If authentic, this data could be abused for phishing, identity targeting, customer impersonation, fraud, social engineering, and targeted scams involving pet owners or service customers.
Status:
This remains an unverified underground forum claim. The actor posted sample file links and claims the dataset is available for purchase.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
gitGraber: Monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
GitHub: https://github.com/hisxo/gitGraber
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
GitHub: https://github.com/hisxo/gitGraber
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โผ๏ธ๐น๐ผ Nothing has been claimed a victim to INC Ransom Ransomware
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ GitHub source code allegedly offered for sale: Internal orgs and private repositories claimed
A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data.
The actor claims the dataset includes around 4,000 private repositories and says samples can be provided to interested buyers to verify authenticity.
โโโโโโโโโโโโโโโโโโโโ
Target: GitHub
Country: United States
Sector: Technology / Software Development / Source Code
Incident Type: Alleged Source Code Sale
Claimed Exposure: Around 4,000 private repositories
Actor: TeamPCP
Price: Offers over $50,000
โโโโโโโโโโโโโโโโโโโโ
According to the post, the actor claims the material includes source code and internal organization data tied to GitHubโs main platform. The post also references a public file list and includes screenshots showing numerous repository archive names.
Why it matters:
If authentic, exposed source code and internal repository data could increase the risk of code review by hostile actors, vulnerability discovery, supply chain targeting, impersonation, phishing, and follow-on attacks against developer infrastructure.
Status:
This remains an unverified underground forum claim. The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data.
The actor claims the dataset includes around 4,000 private repositories and says samples can be provided to interested buyers to verify authenticity.
โโโโโโโโโโโโโโโโโโโโ
Target: GitHub
Country: United States
Sector: Technology / Software Development / Source Code
Incident Type: Alleged Source Code Sale
Claimed Exposure: Around 4,000 private repositories
Actor: TeamPCP
Price: Offers over $50,000
โโโโโโโโโโโโโโโโโโโโ
According to the post, the actor claims the material includes source code and internal organization data tied to GitHubโs main platform. The post also references a public file list and includes screenshots showing numerous repository archive names.
Why it matters:
If authentic, exposed source code and internal repository data could increase the risk of code review by hostile actors, vulnerability discovery, supply chain targeting, impersonation, phishing, and follow-on attacks against developer infrastructure.
Status:
This remains an unverified underground forum claim. The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ฅ3
Media is too big
VIEW IN TELEGRAM
The Hackers Who Stopped Iran's Nuclear Program
In 2009, Iranโs nuclear program started tearing itself apart from within. Centrifuges failed. Alarms screamed. Yet no missile had struck, and no bomb had fallen. The weapon was invisible: a piece of code. This is the true story of Stuxnet, the virus that sabotaged machines, redefined cyberwarfare, and forever changed the rules of conflict.
Video Credit: youtube.com/@Blackfiles-HD
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
In 2009, Iranโs nuclear program started tearing itself apart from within. Centrifuges failed. Alarms screamed. Yet no missile had struck, and no bomb had fallen. The weapon was invisible: a piece of code. This is the true story of Stuxnet, the virus that sabotaged machines, redefined cyberwarfare, and forever changed the rules of conflict.
Video Credit: youtube.com/@Blackfiles-HD
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ช๐ธ Olipes allegedly listed on SAFEPAY Ransomware: Spanish chemical manufacturer targeted
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1