๐Ÿ”ช Slice For Life - Part 2 ๐Ÿ”ช
3.22K subscribers
746 photos
19 videos
549 links
Download Telegram
๐Ÿšจ๐Ÿ‡ฆ๐Ÿ‡ท Ruca Baruk Boxer allegedly leaked: 624K personal and contact records exposed

A threat actor using the alias Databasehooligan claims to be selling a dataset allegedly originating from rucabarukboxer.com.ar, an Argentina-based organization connected to dog owner, dog profile, and service booking records.

The actor claims the dataset includes approximately 624,000 records across contacts, dog profiles, and service bookings.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Ruca Baruk Boxer
Country: Argentina
Sector: Pet Services / Dog Breeding / Customer Records
Incident Type: Alleged Database Sale
Claimed Exposure: 624K records
Actor: Databasehooligan
Price: $1,200
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

According to the post, the dataset allegedly contains customer contact details, emails, phone numbers, addresses, usernames, national ID fields, profile metadata, dog breed and health-related information, vaccination details, microchip numbers, service appointment records, payment status fields, booking notes, feedback notes, and related operational data.

Why it matters:

If authentic, this data could be abused for phishing, identity targeting, customer impersonation, fraud, social engineering, and targeted scams involving pet owners or service customers.

Status:

This remains an unverified underground forum claim. The actor posted sample file links and claims the dataset is available for purchase.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
gitGraber: Monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...

GitHub: https://github.com/hisxo/gitGraber
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โ€ผ๏ธ๐Ÿ‡น๐Ÿ‡ผ Nothing has been claimed a victim to INC Ransom Ransomware

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ GitHub source code allegedly offered for sale: Internal orgs and private repositories claimed

A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data.

The actor claims the dataset includes around 4,000 private repositories and says samples can be provided to interested buyers to verify authenticity.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: GitHub
Country: United States
Sector: Technology / Software Development / Source Code
Incident Type: Alleged Source Code Sale
Claimed Exposure: Around 4,000 private repositories
Actor: TeamPCP
Price: Offers over $50,000
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

According to the post, the actor claims the material includes source code and internal organization data tied to GitHubโ€™s main platform. The post also references a public file list and includes screenshots showing numerous repository archive names.

Why it matters:

If authentic, exposed source code and internal repository data could increase the risk of code review by hostile actors, vulnerability discovery, supply chain targeting, impersonation, phishing, and follow-on attacks against developer infrastructure.

Status:

This remains an unverified underground forum claim. The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿ”ฅ3
Media is too big
VIEW IN TELEGRAM
The Hackers Who Stopped Iran's Nuclear Program

In 2009, Iranโ€™s nuclear program started tearing itself apart from within. Centrifuges failed. Alarms screamed. Yet no missile had struck, and no bomb had fallen. The weapon was invisible: a piece of code. This is the true story of Stuxnet, the virus that sabotaged machines, redefined cyberwarfare, and forever changed the rules of conflict.

Video Credit: youtube.com/@Blackfiles-HD
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡ช๐Ÿ‡ธ Olipes allegedly listed on SAFEPAY Ransomware: Spanish chemical manufacturer targeted
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2026-45829: ChromaToast Served Pre-Auth Demo

Demonstration of CVE-2026-45829 from the "ChromaToast Served Pre-Auth" blog.

Video Credit: https://www.youtube.com/@hiddenlayer
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡บ๐Ÿ‡ธ Reltio allegedly breached: 879,914 customer records and 1.65GB database exposed

A threat actor using the alias zSenior claims that Reltioโ€™s Master Data Management cloud-native solution suffered a cyber intrusion resulting in the compromise of customer database records.

The actor claims the dataset includes 879,914 total CSV records with a total size of 1.65GB.

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”
Target: Reltio
Country: United States
Sector: Cloud Data Management / Master Data Management / Customer Data
Incident Type: Alleged Database Leak
Claimed Exposure: 879,914 records
Actor: zSenior
Date Observed: 19/05/2026
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

According to the post, the allegedly compromised data includes IDs, first names, last names, dates of birth, gender, email addresses, phone numbers, address fields, city, state or province, postal codes, medical and recreational indicators, loyalty balances, loyalty spend, identifier fields, Reltio IDs, creation dates, update dates, and additional customer database fields.

Why it matters:

If authentic, this data could be abused for phishing, identity targeting, customer profiling, account takeover attempts, fraud, social engineering, and targeted scams using personal and contact information.

Status:

This remains an unverified underground forum claim. The actor posted visible sample records and claims the full leak is available through hidden forum content and DeepVault.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: Delano Public Schools
Domain: delano.k12.mn.us

Country: ๐Ÿ‡บ๐Ÿ‡ธ US
Date: May 19th, 2026

Summary:
Classes were cancelled in Delano, Minnesota on Wednesday following a cybersecurity incident. The school district indicated that the incident occurred Monday evening and that internet access was cut off immediately after the network was compromised. The district has not confirmed whether this was a cyberattack, but experts are working to identify and resolve the issue.

Source: https://www.cbsnews.com/minnesota/news/delano-schools-closed-cyber-incident/
Cyberattack News Alert
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

Victim: GitHub
Domain: github.com

Country: ๐Ÿ‡บ๐Ÿ‡ธ US
Date: May 19th, 2026

Summary:
On May 20, GitHub published the findings of its investigation into an intrusion into its internal repositories, resulting from an attack carried out using a malicious Visual Studio Code (VS Code) extension. The attack targeted an employee's devices the day before, and GitHub took steps to remove the malicious version of the extension and isolate the affected endpoints. The investigation revealed that approximately 3,800 repositories had been compromised, consistent with the scope claimed by the threat actor, the group TeamPCP. To mitigate security risks, GitHub rotated important security keys starting May 19 and plans to continue analyzing system logs and monitoring going forward.

Source: https://www.minsimnews.com/news/articleView.html?idxno=50678
๐Ÿ”ฅ1
โš ๏ธ๐Ÿ‡บ๐Ÿ‡ธ LEAK CLAIM / HEALTH INSURANCE

VIP Universal Medical Insurance Group Inc. has been named in a forum sale listing involving an alleged insurance database exposure.

The actor claims the data includes insured members, staff, partners, agents, legal documents, negotiation records, and identity-related files.

[ Details ]

๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜: VIP Universal Medical Insurance Group Inc.
๐—Ÿ๐—ผ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: United States
๐—–๐—ฎ๐˜๐—ฒ๐—ด๐—ผ๐—ฟ๐˜†: Health Insurance
๐—”๐—ฐ๐˜๐—ผ๐—ฟ: kalabaz
๐—–๐—น๐—ฎ๐—ถ๐—บ: Database sale
๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ: 300K insured + 25K staff/partner/agent records
๐—ฃ๐—ฟ๐—ถ๐—ฐ๐—ฒ: $400
๐—ข๐—ฏ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฑ: 19/05/2026

[ Claimed Data ]

โ€ข Insured member records
โ€ข Staff, partner, and agent records
โ€ข Social Security number fields
โ€ข Passport document references
โ€ข W-9 form references
โ€ข Legal and lawsuit-related documents
โ€ข Negotiation correspondence
โ€ข Database enumeration and exfiltration proof references

[ Verification ]

Unverified underground forum claim. The actor posted multiple proof categories and backup links, while claiming the dataset was exfiltrated from VUMI-related systems.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โ€ผ๏ธ LAPSUS$ Group announces a joint for sale post with TeamPCP for the GitHub internal repositories.

TeamPCP launched a for sale post yesterday on a popular cybercrime forum for at least $50,000.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค2
โš ๏ธ๐Ÿ‡จ๐Ÿ‡ด LEAK CLAIM / HIGHER EDUCATION

Universidad del Quindรญo has been named in a forum leak post involving an alleged university database exposure.

The actor claims the dump includes emails, passwords, full names, and administrative credentials across multiple university departments.

[ Details ]

๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜: Universidad del Quindรญo
๐—Ÿ๐—ผ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Colombia
๐—–๐—ฎ๐˜๐—ฒ๐—ด๐—ผ๐—ฟ๐˜†: Higher Education
๐—”๐—ฐ๐˜๐—ผ๐—ฟ: Skull1172
๐—–๐—น๐—ฎ๐—ถ๐—บ: University database leak
๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ: 3.26GB
๐—ฃ๐—ฟ๐—ถ๐—ฐ๐—ฒ: Free
๐—ข๐—ฏ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฑ: 19/05/2026

[ Claimed Data ]

โ€ข Student and staff account records
โ€ข Full names and usernames
โ€ข University email addresses
โ€ข Password fields
โ€ข Administrative credentials
โ€ข Department-level database records
โ€ข JSON-formatted database files

[ Verification ]

Unverified underground forum claim. The actor posted a sample record.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐Ÿšจ๐Ÿ‡ฆ๐Ÿ‡ช UAE Government Data | Alleged ID Document Exposure

A threat actor claims to have leaked a UAE government-related dataset containing identity documents and citizen records.

The post claims the dataset includes more than 3M records, with sample UAE IDs and government documents shown as proof.

[ Details ]

๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜: UAE Government Data
๐—Ÿ๐—ผ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: United Arab Emirates
๐—–๐—ฎ๐˜๐—ฒ๐—ด๐—ผ๐—ฟ๐˜†: Government / Identity Records
๐—”๐—ฐ๐˜๐—ผ๐—ฟ: realchimera
๐—–๐—น๐—ฎ๐—ถ๐—บ: Government data leak
๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ: 3M+ records
๐—ฃ๐—ฟ๐—ถ๐—ฐ๐—ฒ: Free
๐—ข๐—ฏ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฑ: 19/05/2026

[ Claimed Data ]

โ€ข UAE ID records
โ€ข Government documents
โ€ข UAE phone numbers
โ€ข Email address fields
โ€ข Identity document images
โ€ข Sample ID cards shown as proof

[ Verification ]

Unverified underground forum claim. The actor posted document samples.

Stop guessing what's redacted. Subscribers see everything โ†’ darkwebinformer.com/pricing
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations