๐จ GitHub source code allegedly offered for sale: Internal orgs and private repositories claimed
A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data.
The actor claims the dataset includes around 4,000 private repositories and says samples can be provided to interested buyers to verify authenticity.
โโโโโโโโโโโโโโโโโโโโ
Target: GitHub
Country: United States
Sector: Technology / Software Development / Source Code
Incident Type: Alleged Source Code Sale
Claimed Exposure: Around 4,000 private repositories
Actor: TeamPCP
Price: Offers over $50,000
โโโโโโโโโโโโโโโโโโโโ
According to the post, the actor claims the material includes source code and internal organization data tied to GitHubโs main platform. The post also references a public file list and includes screenshots showing numerous repository archive names.
Why it matters:
If authentic, exposed source code and internal repository data could increase the risk of code review by hostile actors, vulnerability discovery, supply chain targeting, impersonation, phishing, and follow-on attacks against developer infrastructure.
Status:
This remains an unverified underground forum claim. The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data.
The actor claims the dataset includes around 4,000 private repositories and says samples can be provided to interested buyers to verify authenticity.
โโโโโโโโโโโโโโโโโโโโ
Target: GitHub
Country: United States
Sector: Technology / Software Development / Source Code
Incident Type: Alleged Source Code Sale
Claimed Exposure: Around 4,000 private repositories
Actor: TeamPCP
Price: Offers over $50,000
โโโโโโโโโโโโโโโโโโโโ
According to the post, the actor claims the material includes source code and internal organization data tied to GitHubโs main platform. The post also references a public file list and includes screenshots showing numerous repository archive names.
Why it matters:
If authentic, exposed source code and internal repository data could increase the risk of code review by hostile actors, vulnerability discovery, supply chain targeting, impersonation, phishing, and follow-on attacks against developer infrastructure.
Status:
This remains an unverified underground forum claim. The actor states this is not a ransom attempt and claims the data may be leaked publicly if no buyer is found.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ฅ3
Media is too big
VIEW IN TELEGRAM
The Hackers Who Stopped Iran's Nuclear Program
In 2009, Iranโs nuclear program started tearing itself apart from within. Centrifuges failed. Alarms screamed. Yet no missile had struck, and no bomb had fallen. The weapon was invisible: a piece of code. This is the true story of Stuxnet, the virus that sabotaged machines, redefined cyberwarfare, and forever changed the rules of conflict.
Video Credit: youtube.com/@Blackfiles-HD
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
In 2009, Iranโs nuclear program started tearing itself apart from within. Centrifuges failed. Alarms screamed. Yet no missile had struck, and no bomb had fallen. The weapon was invisible: a piece of code. This is the true story of Stuxnet, the virus that sabotaged machines, redefined cyberwarfare, and forever changed the rules of conflict.
Video Credit: youtube.com/@Blackfiles-HD
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ช๐ธ Olipes allegedly listed on SAFEPAY Ransomware: Spanish chemical manufacturer targeted
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2026-45829: ChromaToast Served Pre-Auth Demo
Demonstration of CVE-2026-45829 from the "ChromaToast Served Pre-Auth" blog.
Video Credit: https://www.youtube.com/@hiddenlayer
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Demonstration of CVE-2026-45829 from the "ChromaToast Served Pre-Auth" blog.
Video Credit: https://www.youtube.com/@hiddenlayer
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐บ๐ธ Reltio allegedly breached: 879,914 customer records and 1.65GB database exposed
A threat actor using the alias zSenior claims that Reltioโs Master Data Management cloud-native solution suffered a cyber intrusion resulting in the compromise of customer database records.
The actor claims the dataset includes 879,914 total CSV records with a total size of 1.65GB.
โโโโโโโโโโโโโโโโโโโโ
Target: Reltio
Country: United States
Sector: Cloud Data Management / Master Data Management / Customer Data
Incident Type: Alleged Database Leak
Claimed Exposure: 879,914 records
Actor: zSenior
Date Observed: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
According to the post, the allegedly compromised data includes IDs, first names, last names, dates of birth, gender, email addresses, phone numbers, address fields, city, state or province, postal codes, medical and recreational indicators, loyalty balances, loyalty spend, identifier fields, Reltio IDs, creation dates, update dates, and additional customer database fields.
Why it matters:
If authentic, this data could be abused for phishing, identity targeting, customer profiling, account takeover attempts, fraud, social engineering, and targeted scams using personal and contact information.
Status:
This remains an unverified underground forum claim. The actor posted visible sample records and claims the full leak is available through hidden forum content and DeepVault.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor using the alias zSenior claims that Reltioโs Master Data Management cloud-native solution suffered a cyber intrusion resulting in the compromise of customer database records.
The actor claims the dataset includes 879,914 total CSV records with a total size of 1.65GB.
โโโโโโโโโโโโโโโโโโโโ
Target: Reltio
Country: United States
Sector: Cloud Data Management / Master Data Management / Customer Data
Incident Type: Alleged Database Leak
Claimed Exposure: 879,914 records
Actor: zSenior
Date Observed: 19/05/2026
โโโโโโโโโโโโโโโโโโโโ
According to the post, the allegedly compromised data includes IDs, first names, last names, dates of birth, gender, email addresses, phone numbers, address fields, city, state or province, postal codes, medical and recreational indicators, loyalty balances, loyalty spend, identifier fields, Reltio IDs, creation dates, update dates, and additional customer database fields.
Why it matters:
If authentic, this data could be abused for phishing, identity targeting, customer profiling, account takeover attempts, fraud, social engineering, and targeted scams using personal and contact information.
Status:
This remains an unverified underground forum claim. The actor posted visible sample records and claims the full leak is available through hidden forum content and DeepVault.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ช Slice For Life - Part 2 ๐ช
๐จ GitHub source code allegedly offered for sale: Internal orgs and private repositories claimed A threat actor using the alias TeamPCP claims to be selling GitHub source code and internal organization data. The actor claims the dataset includes around 4โฆ
๐จ GitHub is investigating the unauthorized access claim to it's internal repositories.
https://x.com/github/status/2056884788179726685
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
https://x.com/github/status/2056884788179726685
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค2
ShinyHunters Goes After Cybersecurity Firm Warning Victims Not to Pay Ransoms
https://www.pcmag.com/news/shinyhunters-goes-after-cybersecurity-firm-warning-victims-not-to-pay-ransoms
https://www.pcmag.com/news/shinyhunters-goes-after-cybersecurity-firm-warning-victims-not-to-pay-ransoms
PCMAG
ShinyHunters Goes After Cybersecurity Firm Warning Victims Not to Pay Ransoms
Unit 221B says ShinyHunters, the gang behind the Canvas outage, has been bombarding it with emails and calls after it advised the public to avoid giving in to the group's extortion demands.
โค1
Cyberattack News Alert
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: Delano Public Schools
Domain:
Country: ๐บ๐ธ US
Date: May 19th, 2026
Summary:
Classes were cancelled in Delano, Minnesota on Wednesday following a cybersecurity incident. The school district indicated that the incident occurred Monday evening and that internet access was cut off immediately after the network was compromised. The district has not confirmed whether this was a cyberattack, but experts are working to identify and resolve the issue.
Source: https://www.cbsnews.com/minnesota/news/delano-schools-closed-cyber-incident/
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: Delano Public Schools
Domain:
delano.k12.mn.usCountry: ๐บ๐ธ US
Date: May 19th, 2026
Summary:
Classes were cancelled in Delano, Minnesota on Wednesday following a cybersecurity incident. The school district indicated that the incident occurred Monday evening and that internet access was cut off immediately after the network was compromised. The district has not confirmed whether this was a cyberattack, but experts are working to identify and resolve the issue.
Source: https://www.cbsnews.com/minnesota/news/delano-schools-closed-cyber-incident/
๐ช Slice For Life - Part 2 ๐ช
๐จ GitHub is investigating the unauthorized access claim to it's internal repositories. https://x.com/github/status/2056884788179726685 ________________________________________ Main Channel: https://t.me/SliceForLifeee Backup Channel: https://t.me/SliceForLifeeeeโฆ
GitHub confirms they were compromised after an employee device involving a poisoned VS Code extension
https://x.com/github/status/2056949168208552080
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
https://x.com/github/status/2056949168208552080
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค2
Cyberattack News Alert
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: GitHub
Domain:
Country: ๐บ๐ธ US
Date: May 19th, 2026
Summary:
On May 20, GitHub published the findings of its investigation into an intrusion into its internal repositories, resulting from an attack carried out using a malicious Visual Studio Code (VS Code) extension. The attack targeted an employee's devices the day before, and GitHub took steps to remove the malicious version of the extension and isolate the affected endpoints. The investigation revealed that approximately 3,800 repositories had been compromised, consistent with the scope claimed by the threat actor, the group TeamPCP. To mitigate security risks, GitHub rotated important security keys starting May 19 and plans to continue analyzing system logs and monitoring going forward.
Source: https://www.minsimnews.com/news/articleView.html?idxno=50678
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: GitHub
Domain:
github.comCountry: ๐บ๐ธ US
Date: May 19th, 2026
Summary:
On May 20, GitHub published the findings of its investigation into an intrusion into its internal repositories, resulting from an attack carried out using a malicious Visual Studio Code (VS Code) extension. The attack targeted an employee's devices the day before, and GitHub took steps to remove the malicious version of the extension and isolate the affected endpoints. The investigation revealed that approximately 3,800 repositories had been compromised, consistent with the scope claimed by the threat actor, the group TeamPCP. To mitigate security risks, GitHub rotated important security keys starting May 19 and plans to continue analyzing system logs and monitoring going forward.
Source: https://www.minsimnews.com/news/articleView.html?idxno=50678
๋ฏผ์ฌ๋ด์ค
GitHub, 3,800๊ฐ ๋ด๋ถ ์ ์ฅ์ ๋๋ ์ฌ๊ฑด ์กฐ์ฌ ์ฐฉ์ (GITHUB, VS Code, ์
์ฑ ํ์ฅ ํ๋ก๊ทธ๋จ, ์ฌ์ด๋ฒ ๊ณต๊ฒฉ)
์ฌ๊ฑด
๋ฐ์ ์์
์์ธ
์กฐ์น
์ถ์ฒ
(์์ธ=๋ฏผ์ฌ๋ด์ค) 5์ 20์ผ, GitHub๋ ๋ด๋ถ ์ ์ฅ
๋ฐ์ ์์
์์ธ
์กฐ์น
์ถ์ฒ
(์์ธ=๋ฏผ์ฌ๋ด์ค) 5์ 20์ผ, GitHub๋ ๋ด๋ถ ์ ์ฅ
๐ฅ1
โ ๏ธ๐บ๐ธ LEAK CLAIM / HEALTH INSURANCE
VIP Universal Medical Insurance Group Inc. has been named in a forum sale listing involving an alleged insurance database exposure.
The actor claims the data includes insured members, staff, partners, agents, legal documents, negotiation records, and identity-related files.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: VIP Universal Medical Insurance Group Inc.
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: United States
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Health Insurance
๐๐ฐ๐๐ผ๐ฟ: kalabaz
๐๐น๐ฎ๐ถ๐บ: Database sale
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 300K insured + 25K staff/partner/agent records
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: $400
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข Insured member records
โข Staff, partner, and agent records
โข Social Security number fields
โข Passport document references
โข W-9 form references
โข Legal and lawsuit-related documents
โข Negotiation correspondence
โข Database enumeration and exfiltration proof references
[ Verification ]
Unverified underground forum claim. The actor posted multiple proof categories and backup links, while claiming the dataset was exfiltrated from VUMI-related systems.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
VIP Universal Medical Insurance Group Inc. has been named in a forum sale listing involving an alleged insurance database exposure.
The actor claims the data includes insured members, staff, partners, agents, legal documents, negotiation records, and identity-related files.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: VIP Universal Medical Insurance Group Inc.
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: United States
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Health Insurance
๐๐ฐ๐๐ผ๐ฟ: kalabaz
๐๐น๐ฎ๐ถ๐บ: Database sale
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 300K insured + 25K staff/partner/agent records
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: $400
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข Insured member records
โข Staff, partner, and agent records
โข Social Security number fields
โข Passport document references
โข W-9 form references
โข Legal and lawsuit-related documents
โข Negotiation correspondence
โข Database enumeration and exfiltration proof references
[ Verification ]
Unverified underground forum claim. The actor posted multiple proof categories and backup links, while claiming the dataset was exfiltrated from VUMI-related systems.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โผ๏ธ LAPSUS$ Group announces a joint for sale post with TeamPCP for the GitHub internal repositories.
TeamPCP launched a for sale post yesterday on a popular cybercrime forum for at least $50,000.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
TeamPCP launched a for sale post yesterday on a popular cybercrime forum for at least $50,000.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค2
โ ๏ธ๐จ๐ด LEAK CLAIM / HIGHER EDUCATION
Universidad del Quindรญo has been named in a forum leak post involving an alleged university database exposure.
The actor claims the dump includes emails, passwords, full names, and administrative credentials across multiple university departments.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: Universidad del Quindรญo
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: Colombia
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Higher Education
๐๐ฐ๐๐ผ๐ฟ: Skull1172
๐๐น๐ฎ๐ถ๐บ: University database leak
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 3.26GB
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: Free
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข Student and staff account records
โข Full names and usernames
โข University email addresses
โข Password fields
โข Administrative credentials
โข Department-level database records
โข JSON-formatted database files
[ Verification ]
Unverified underground forum claim. The actor posted a sample record.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Universidad del Quindรญo has been named in a forum leak post involving an alleged university database exposure.
The actor claims the dump includes emails, passwords, full names, and administrative credentials across multiple university departments.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: Universidad del Quindรญo
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: Colombia
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Higher Education
๐๐ฐ๐๐ผ๐ฟ: Skull1172
๐๐น๐ฎ๐ถ๐บ: University database leak
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 3.26GB
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: Free
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข Student and staff account records
โข Full names and usernames
โข University email addresses
โข Password fields
โข Administrative credentials
โข Department-level database records
โข JSON-formatted database files
[ Verification ]
Unverified underground forum claim. The actor posted a sample record.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐จ๐ฆ๐ช UAE Government Data | Alleged ID Document Exposure
A threat actor claims to have leaked a UAE government-related dataset containing identity documents and citizen records.
The post claims the dataset includes more than 3M records, with sample UAE IDs and government documents shown as proof.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: UAE Government Data
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: United Arab Emirates
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Government / Identity Records
๐๐ฐ๐๐ผ๐ฟ: realchimera
๐๐น๐ฎ๐ถ๐บ: Government data leak
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 3M+ records
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: Free
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข UAE ID records
โข Government documents
โข UAE phone numbers
โข Email address fields
โข Identity document images
โข Sample ID cards shown as proof
[ Verification ]
Unverified underground forum claim. The actor posted document samples.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked a UAE government-related dataset containing identity documents and citizen records.
The post claims the dataset includes more than 3M records, with sample UAE IDs and government documents shown as proof.
[ Details ]
๐ง๐ฎ๐ฟ๐ด๐ฒ๐: UAE Government Data
๐๐ผ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: United Arab Emirates
๐๐ฎ๐๐ฒ๐ด๐ผ๐ฟ๐: Government / Identity Records
๐๐ฐ๐๐ผ๐ฟ: realchimera
๐๐น๐ฎ๐ถ๐บ: Government data leak
๐๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ: 3M+ records
๐ฃ๐ฟ๐ถ๐ฐ๐ฒ: Free
๐ข๐ฏ๐๐ฒ๐ฟ๐๐ฒ๐ฑ: 19/05/2026
[ Claimed Data ]
โข UAE ID records
โข Government documents
โข UAE phone numbers
โข Email address fields
โข Identity document images
โข Sample ID cards shown as proof
[ Verification ]
Unverified underground forum claim. The actor posted document samples.
Stop guessing what's redacted. Subscribers see everything โ darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Microsoft acknowledges the YellowKey BitLocker bypass vulnerability and releases mitigations
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
โค1
โผ๏ธ New Dark Web Informer Blog Post!
Title: Uruguay DNIC allegedly leaked: 5.8M citizen database records exposed
Link: https://darkwebinformer.com/uruguay-dnic-allegedly-leaked-5-8m-citizen-database-records-exposed/
Title: Uruguay DNIC allegedly leaked: 5.8M citizen database records exposed
Link: https://darkwebinformer.com/uruguay-dnic-allegedly-leaked-5-8m-citizen-database-records-exposed/
Dark Web Informer
Uruguay DNIC allegedly leaked: 5.8M citizen database records exposed
A forum actor claims to have shared a Uruguay DNIC citizen database containing more than 5.8 million records.
๐จ First VPN Service has been seized by law enforcement
operation-saffron.eu
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
operation-saffron.eu
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
๐ญ4๐1
Cyberattack News Alert
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: SPLIU
Domain:
Country: ๐ต๐ท PR
Date: May 18th, 2026
Summary:
The SPLIU union fell victim to a cyberattack on May 18, the same day it had announced a national strike of early childhood and lower secondary school teachers scheduled for June 15. The attack affected the normal operation of its services, but the union assures that this will not prevent it from continuing its demands for 'absolute equity' in the teaching profession.
Source: https://ovilaverdense.pt/sindicato-denuncia-ataque-informatico-apos-anuncio-de-greve-nacional-de-educadores-e-professores/
โโโโโโโโโโโโโโโโโโโโโโโโโ
Victim: SPLIU
Domain:
spliu.ptCountry: ๐ต๐ท PR
Date: May 18th, 2026
Summary:
The SPLIU union fell victim to a cyberattack on May 18, the same day it had announced a national strike of early childhood and lower secondary school teachers scheduled for June 15. The attack affected the normal operation of its services, but the union assures that this will not prevent it from continuing its demands for 'absolute equity' in the teaching profession.
Source: https://ovilaverdense.pt/sindicato-denuncia-ataque-informatico-apos-anuncio-de-greve-nacional-de-educadores-e-professores/
O Vilaverdense
Sindicato denuncia ataque informรกtico apรณs anรบncio de greve nacional de educadores e professores
SPLIU diz que incidente ocorreu no mesmo dia em que foi convocada paralisaรงรฃo para 15 de junho e garante que continuarรก a lutar por โequidade absolutaโ na carreira docente.