news

Breaking Cyber News From Cyberint

Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.

  • Apr 16, 2025

    • United States
    • Lemonade Insurance Agency
    • Finance
    • North America

    Lemonade Insurance Reports Data Leak Involving Driver License Numbers

    Lemonade Insurance has disclosed a potential data leak caused by a technical issue/vulnerability in a third-party vendor’s non-encrypted API. The incident may have exposed customer driver's license numbers. While no misuse has been reported so far, the exposure of this sensitive identifier raises concerns about identity theft risks, especially when combined with other personal data.

  • Apr 16, 2025

    • Exfiltration Over Alternative Protocol
    • Czech Republic
    • Visual Basic
    • Scheduled Task
    • Software Packing
    • Malicious File
    • India
    • Phishing
    • Web Protocols
    • Brazil
    • Southern Europe
    • Debugger Evasion
    • Scripting
    • Reflective Code Loading
    • Europe
    • Italy
    • Latin America And The Caribbean
    • Digital Certificates
    • Exploitation For Defense Evasion
    • Ingress Tool Transfer
    • Healthcare
    • Spearphishing Link
    • Shared Modules
    • Rundll32
    • Deobfuscate/Decode Files Or Information
    • Asia
    • Shortcut Modification
    • System Checks
    • Asymmetric Cryptography
    • Southern Asia
    • Disable Or Modify Tools
    • South-Eastern Asia
    • Resolverrat
    • Portugal
    • Dns
    • Spearphishing Attachment
    • Indonesia
    • Junk Data
    • Registry Run Keys / Startup Folder
    • Dll Side-Loading
    • Middle East
    • Exfiltration Over C2 Channel
    • Protocol Impersonation
    • Security Software Discovery
    • Obfuscated Files Or Information
    • Turkey

    ResolverRat: A New Threat to Healthcare Cybersecurity

    Cybersecurity researchers have identified a sophisticated remote access trojan named ResolverRat, which is targeting the healthcare and pharmaceutical sectors through fear-based phishing emails. The campaign, observed as recently as March 2025, employs localized phishing lures in various languages to increase infection rates. ResolverRat utilizes advanced techniques such as DLL side-loading, multi-stage bootstrapping, and certificate-based authentication to establish persistent connections with command-and-control servers while evading detection. The malware's goal is to execute commands from the C2 server and exfiltrate data in small chunks to minimize detection risks.

  • Apr 16, 2025

    • Transportation
    • Government
    • Xenorat
    • Asia
    • Curlback Rat
    • Sparkrat
    • Critical Infrastructures
    • India
    • Energy
    • Sidecopy
    • Railroad Transportation
    • Southern Asia

    Pakistani Threat Actor Expands Targeting in India with New Malware Techniques

    A threat actor linked to Pakistan has been observed targeting various sectors in India, including the railway, oil and gas, and external affairs ministries, using multiple remote access trojans such as Xeno RAT, Spark RAT, and a new malware called Curlback RAT. This activity, detected by Seqrite in December 2024, marks a significant expansion beyond previous targets like government and defense sectors. The group has shifted its tactics from using HTML application files to Microsoft Installer packages for malware deployment and employs sophisticated techniques like DLL side-loading and credential phishing to enhance persistence and evade detection.

  • Apr 14, 2025

    • Israel
    • Asia
    • Middle East
    • Banyuwangixploit

    Threat Actor Claims Leak of 2GB of Data Belonging to Israeli Entities

    On April 10th, 2025, the threat actor named "BanyuwangiXploit" claimed to have a dataset belonging to Israeli entities. According to the threat actor, over 2GB of data were taken and shared on a darknet forum. The data seems to include email addresses, along with private communications.

  • Apr 14, 2025

    • Russia
    • Media
    • Government
    • Eastern Europe
    • Telecommunications
    • Powermodul
    • Paper Werewolf
    • Europe
    • Construction
    • Energy

    New Cyber Attacks by Paper Werewolf Targeting Russian Entities

    The threat actor known as Paper Werewolf, also referred to as Goffee, has been actively targeting Russian organizations across various sectors, including mass media, telecommunications, construction, government, and energy, with a new implant called Powermodul. Between July and December 2024, Kaspersky reported that Paper Werewolf conducted at least seven campaigns, utilizing phishing emails with macro-laden documents to deploy a PowerShell-based remote access trojan named Powerrat. The attacks often involve a multi-stage infection process, leveraging malicious RAR archives and executable files disguised as documents. The Powermodul backdoor, introduced in early 2024, has been used to download additional payloads like Powertaskel and Flashfilegrabber, which facilitate data exfiltration and further compromise of targeted systems.

  • Apr 14, 2025

    • Akirabot

    AkiraBot: AI-Powered Spam Campaign Targeting Websites

    Cybersecurity researchers have uncovered a new AI-powered bot named AkiraBot, which has been actively spamming over 400,000 websites since September 2024. This bot utilizes OpenAI's language models to generate tailored spam messages that bypass traditional spam filters and CAPTCHA protections. Initially known as ShopBot, AkiraBot targets contact forms and chat widgets on small to medium-sized business websites, leveraging a user-friendly interface for mass targeting. The bot's sophisticated design allows it to mimic legitimate user behavior and evade detection, raising concerns about the challenges AI poses in combating spam attacks. In response to these findings, OpenAI has disabled the API key used by the bot's operators.

  • Apr 10, 2025

    • Southern Europe
    • Europe
    • Energy
    • Spain
    • Endesa S.A
    • Donalddump

    Endesa ENERGIA XXI- Breach - 2025-04-05

    The threat actor known as DonaldDump claims to have breached Spanish utilities company Energía XXI and is selling a database containing 4,015,311 records for 7500$. According to the post, the compromised data includes national ID numbers (DNI), full names, phone numbers, addresses, email addresses, IBANs, and utility identifiers (LUZCUPS or GASCUPS). All records include bank account details (IBANs).

  • Apr 10, 2025

    • Network Denial Of Service
    • Education
    • Asia
    • Israel
    • Middle East
    • Access Israel
    • Ruskinet

    RuskiNet Takes Down Access Israel Website in Geopolitical Cyber Attack

    The Access Israel website, focused on Israeli security research, was taken down by RuskiNet. This attack disrupts access to critical research on Israeli defense strategies, aligning with the ongoing #OpIsrael campaign.

  • Apr 10, 2025

    • United States
    • Business Services
    • North America
    • Magento
    • Satanic

    Threat Actor Satanic Leaks Magento CRM Data of 745,000 Users

    On April 9th, 2025, the threat actor known as "Satanic" leaked data allegedly stolen from a third-party vendor of Magento. According to the threat actor, over 740 thousand user records were taken, including 430,000 emails and 261,000 phone numbers linked to major global companies—posing serious phishing and fraud risks.

  • Apr 10, 2025

    • Southern Asia
    • Telecommunications
    • Asia
    • Mobile Communication Company Of Iran
    • Islamic Republic Of Iran
    • Shadowbits

    Threat Actors Claim Breach of Iran's Biggest Telecommunications Company

    In April 2025, the threat actor group named Shadowbits claimed to have breached Hamrahe Avval (MCI), Iran's largest mobile operator, and to have gained access to its database. According to the threat actor, a substantial amount of data belonging to MCI's customers was taken, including full names, father names, place of birth, gender, national ID numbers, addresses, postal codes, birth dates, mobile numbers, and SIM card information.

  • Apr 10, 2025

    • United States
    • North America
    • Finance
    • Southern Europe
    • Retail
    • Europe
    • Real Estate
    • Latin America And The Caribbean
    • CVE-2025-29824
    • Venezuela
    • Asia
    • Pipemagic
    • Business Services
    • Storm-2460
    • Saudi Arabia
    • Cve-2025-29824
    • Middle East
    • Technology
    • Spain
    • Software

    Exploitation of Windows Zero-Day Leads to Ransomware Attacks

    Microsoft has disclosed that a recently patched zero-day vulnerability in the Windows Common Log File System (CLFS), identified as CVE-2025-29824, was exploited in targeted ransomware attacks against organizations in various sectors including IT, real estate, finance, and retail across the United States, Venezuela, Spain, and Saudi Arabia. The attacks utilized a malware named 'pipemagic' to deliver the exploit and ransomware payloads, with the initial access vector still under investigation. This vulnerability allows for privilege escalation, enabling threat actors to gain system privileges and deploy ransomware effectively within compromised environments.

  • Apr 09, 2025

    • Marssepe
    • Latin America And The Caribbean
    • Mexico
    • Education

    Threat Actor Claims Breach of 8 Mexican Education Institutes

    In April 2025, the threat actor "marssepe" claimed to have breached 8 Mexican Education institutes. The threat actor has claimed to have access to the institutes' internal databases, including students, teachers, and administration information.

  • Apr 09, 2025

    • Giftedcrook
    • Government
    • Eastern Europe
    • Europe
    • Uac-0226
    • Ukraine

    New Cyber Attacks Target Ukrainian Institutions with an Infostealer

    The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyber attacks aimed at Ukrainian institutions, particularly military and law enforcement agencies near the eastern border. These attacks involve phishing emails containing macro-enabled Excel spreadsheets that deploy two types of malware: a PowerShell script that opens a reverse shell and a new stealer called GiftedCrook, which is designed to steal sensitive data from web browsers. The emails are sent from compromised accounts to appear legitimate, and CERT-UA has attributed the activity to a threat cluster identified as UAC-0226.

  • Apr 06, 2025

    • Business Services
    • Government
    • Network Denial Of Service
    • Asia
    • Islamic Hacker Army
    • Israel
    • Ddos Attack Against Israeli Ministry Of Defense
    • Middle East
    • Israeli Ministry Of Defense

    DDoS Attack against Israeli Ministry of Defense.

    'Islamic Hacker Army' group claims DDoS attack on the website of the Israeli Ministry of Defense as part of OPIsrael campaign.

  • Apr 06, 2025

    • Credentials From Web Browsers
    • File And Directory Discovery
    • Browser Information Discovery
    • Malicious File
    • Data From Local System
    • Javascript
    • Upload Malware
    • South Korea
    • Ingress Tool Transfer
    • Lazarus Group
    • Beavertail
    • Installer Packages
    • Keychain
    • System Information Discovery
    • Asia
    • Automated Collection
    • Compromise Software Supply Chain
    • Financial Theft
    • Exfiltration Over C2 Channel
    • Obfuscated Files Or Information
    • Eastern Asia

    North Korean Lazarus Group Expands Malicious npm Campaign

    The North Korean Lazarus Group has intensified its malicious campaign on the npm ecosystem by releasing new packages that deliver the Beavertail malware and a remote access trojan (RAT) loader. These packages, which masquerade as legitimate utilities, have been designed to evade detection through advanced obfuscation techniques. The campaign aims to infiltrate developer systems under the guise of job interviews, steal sensitive data, and maintain long-term access to compromised systems. Security researchers have identified multiple new npm packages linked to this campaign, indicating the attackers' ongoing efforts to diversify their tactics and increase their success rate.

  • Apr 06, 2025

    • Triada
    • Russia
    • Europe
    • Eastern Europe

    Emergence of Triada Malware in Counterfeit Android Devices

    A new variant of the Triada malware has been discovered preloaded on counterfeit Android smartphones, affecting over 2,600 users, primarily in Russia. This modular malware, first identified in 2016, is capable of stealing sensitive information, manipulating device functions, and enlisting infected devices into a botnet. The malware is distributed through modified apps and has been linked to a broader fraud scheme involving compromised hardware supply chains. Recent analyses indicate that the malware allows attackers to perform various malicious activities, including intercepting messages and hijacking cryptocurrency wallet addresses. The updated version of Triada has reportedly facilitated the transfer of approximately $270,000 in cryptocurrencies to the attackers' wallets between June 2024 and March 2025.

  • Apr 03, 2025

    • Vortex
    • Network Denial Of Service
    • Asia
    • Israel
    • Middle East
    • Healthcare
    • Poria.Org.Il

    Vortex Telegram group Launches DDoS Attack on Poria Hospital Website

    Hacktivists behind the Vortex Telegram group launched a DDoS attack on Poria Hospital's website (poria.org.il), temporarily taking it down. The site has since recovered and is currently active. This incident highlights ongoing cyber threats against Israeli online assets.

  • Apr 02, 2025

    • Indonesia
    • Account Access Removal
    • Israel
    • Authentication Bypass
    • Account Manipulation
    • Bypass User Account Control
    • Social Media Accounts
    • Bangladesh

    Hackers Exploit Voicemail to Hijack Telegram Accounts in Israel

    Cybersecurity experts have warned of a surge in Telegram account hijackings targeting Israelis, with attackers exploiting voicemail vulnerabilities to gain unauthorized access. The Israeli Internet Association has reported a significant increase in cases, linking the attacks to hackers in Bangladesh and Indonesia. The method, which relies on social engineering and technical loopholes, allows attackers to seize control of accounts and lock victims out.

  • Apr 02, 2025

    • Israel-Catalog
    • Network Denial Of Service
    • Retail
    • Israel
    • Red Wolf Team
    • Middle East

    Red Wolf Hacktivist Group Conducts DDoS Attack on Israeli Online Store

    On April 2nd, 2025, the Red Wolf Cyber group claimed to have launched a Distributed Denial of Service (DDoS) attack on the Israeli online store Israel-Catalog.com. Evidence of the attack was provided by the group.

  • Apr 02, 2025

    • Lucid
    • Xinxin Group

    Lucid: The New Phishing-as-a-Service Platform Targeting Global Entities

    A new phishing-as-a-service (PhaaS) platform named Lucid has emerged, targeting 169 entities across 88 countries through smishing messages sent via Apple iMessage and Android's RCS. Developed by a Chinese-speaking hacking group known as the Xinxin group, Lucid utilizes legitimate communication channels to bypass traditional SMS detection mechanisms, allowing for large-scale phishing campaigns aimed at stealing credit card information and personally identifiable information. The platform offers automation tools for creating customizable phishing websites and includes advanced anti-detection techniques, enabling cybercriminals to monitor victim interactions in real-time. This development highlights the growing sophistication and organization of phishing operations in the cybercrime landscape.

  • Apr 02, 2025

    • Jinx-0126
    • Xmrig

    Ongoing PostgreSQL Exploitation Campaign Targets Cryptocurrency Mining

    A new campaign targeting exposed PostgreSQL instances aims to gain unauthorized access and deploy cryptocurrency miners. The campaign, attributed to the threat actor known as Jinx-0126, has reportedly affected over 1,500 victims due to weak or predictable credentials. Researchers have noted that the threat actor employs advanced evasion techniques, such as using unique hashes for binaries and executing miner payloads filelessly. The exploitation involves executing arbitrary shell commands through SQL commands, leading to the installation of a cryptocurrency miner and establishing persistence on compromised systems.

  • Apr 01, 2025

    • Business Services
    • Europe
    • Ghna
    • United Kingdom
    • Royal Mail

    Threat Actor Claims to Have Breached Royal Mail Group

    On March 31, 2025, the threat actor GHNA leaked 144GB of data from Royal Mail Group, including sensitive customer information, internal documents, and Zoom meeting recordings. The breach exposed personal identifiable information (PII) such as names, addresses, and package details, as well as confidential communications between Spectos and Royal Mail Group. The leak also included a Wordpress SQL database for mailagents.uk, Mailchimp mailing lists, and datasets with delivery/post office locations. The total leak consisted of 293 folders and 16,549 files

  • Mar 31, 2025

    • Business Services
    • Asia
    • South Korea
    • Ghna
    • Samsung
    • Technology
    • Eastern Asia

    Samsung Electronics Germany Data Breach

    In March 2025, Samsung Electronics (Germany) experienced a data breach that resulted in the leak of over 270,000 customer satisfaction tickets on BreachForums. The leaked tickets contain sensitive personal information (PII) of customers, including full names, addresses, email addresses, and order numbers. The breach was attributed to threat actor GHNA, who uploaded the data to the forum for public download.

  • Mar 31, 2025

    • Southern Europe
    • Asia
    • Europe
    • Crocodilus
    • Middle East
    • Spain
    • Turkey

    Crocodilus: A New Android Banking Trojan Targeting Spain and Turkey

    Cybersecurity researchers have identified a new Android banking malware named Crocodilus, which is specifically designed to target users in Spain and Turkey. Unlike typical clones, Crocodilus is a sophisticated threat featuring advanced techniques such as remote control, black screen overlays, and extensive data harvesting through accessibility logging. The malware masquerades as a Google Chrome app and, once installed, requests accessibility permissions to connect with a remote server for further instructions. It can intercept credentials from various financial applications and even cryptocurrency wallets by using social engineering tactics to trick users into revealing their seed phrases. The malware's capabilities include monitoring app launches, capturing screen content, and concealing its activities, marking a significant escalation in the sophistication of mobile banking threats.

  • Mar 30, 2025

    • Asia
    • Taiwan
    • Eastern Asia
    • Pjobrat

    Pjobrat Malware Targets Taiwanese Users Through Chat Apps

    The Pjobrat malware, previously associated with attacks on Indian military personnel, has resurfaced in a new campaign targeting Taiwanese users by masquerading as chat applications. This malware is capable of stealing sensitive information such as SMS messages, contacts, and media files from infected Android devices. The latest campaign utilized malicious apps named Sangaallite and Cchat, available for download from various WordPress sites, and operated for nearly two years before pausing in October 2024. The targeted nature of the campaign suggests a small number of infections, likely facilitated by social engineering tactics to deceive users into downloading the malicious apps.

  • Mar 30, 2025

    • Morphing Meerkat
    • Phishing

    Morphing Meerkat - New Phishing-as-a-Service Campaign

    Cybersecurity researchers have uncovered a new phishing-as-a-service (PhaaS) platform operated by a threat actor known as 'Morphing Meerkat,' which exploits DNS mail exchange records to create fake login pages impersonating around 114 brands. This actor utilizes open redirects on adtech infrastructure and compromised domains to distribute phishing emails, often directing victims to fake login pages hosted on Cloudflare R2. The campaign is notable for its ability to dynamically translate phishing content into multiple languages and for employing anti-analysis techniques to complicate detection. By leveraging DNS MX records, the actor can tailor phishing attempts to specific email service providers, enhancing the likelihood of credential theft.

  • Mar 26, 2025

    • Real Estate
    • Mcgrath
    • Australia
    • Australia And New Zealand
    • Dienet

    DieNet Claim Breach of Australian Real Estate Company McGrath

    On March 25, 2025, the hacktivist group "DieNet" claimed responsibility for breaching McGrath, one of Australia's largest and fourth-ranked real estate companies. The breach allegedly involved the seizure of the company's entire database, which included sensitive data such as employee information, customer details, and business financial data (including receipts and company revenues). The group also mentioned that personal information of hundreds of real estate companies and individuals would be published. The targeting was reportedly motivated by Australia's alliance with the United States and support for Trump.

  • Mar 23, 2025

    • Anonymous 71
    • Business Services
    • Government
    • Asia
    • Entertainment
    • Israel
    • Middle East
    • Social Services

    Anonymous 71 Claims Attack on 10 Israeli Sites

    On March 23rd, 2025, the hacktivist group Anonymous 71 claimed to have shut down 10 Sites, 8 of which were located in Israel. The affected sites belong to companies in the Entertainment, Business Services, and Social Services sectors. The group has provided evidence of its DDoS attacks.

  • Mar 20, 2025

    • Network Denial Of Service
    • Asia
    • Retail
    • Israel
    • Red Wolf Team
    • Middle East
    • Argal Services

    Red Wolf Team Claims Attack on Argal Services

    On March 20th, the hacktivist group Red Wolf Team claimed an attack on the Israeli website of Argal Services. The group has provided evidence of its DDoS attack,

  • Mar 20, 2025

    • Government
    • Asia
    • Islamic Hacker Army
    • Israel
    • Middle East
    • Israel Police - Cyber Crime Unit

    Islamic Hacker Army Claim Attack on The Israeli Police

    On March 19th, 2025, the hacktivist group Islamic Hacker Army claimed an attack against the Israeli Police. The group has provided evidence of its DDoS attack.

  • Mar 20, 2025

    • Business Services
    • Restoration Site, Rosh Pena Restoration Association
    • Network Denial Of Service
    • Asia
    • Israel
    • Middle East
    • Rippersec

    Hacktivist Group RipperSec Claims Attack on roshpina.org.il

    On March 19th, 2025, the hacktivist group RipperSec claimed to have attacked the Israeli Website roshpina.org.il, A restoration association, the group has provided evidence of its DDoS attack.

  • Mar 20, 2025

    • Education
    • Asia
    • Bangladesh Civilian Force
    • Israel
    • Middle East
    • Technion Israel Institute Of Technology

    Hacktivist Group Bangladesh Civilian Force Claim Attack on the Technion

    On March 19th, 2025, the hacktivist group Bangladesh Civilian Force claimed to have attacked the Israeli Technion University. The group has provided evidence of its attack.

  • Mar 20, 2025

    • Education
    • Asia
    • Israel
    • Middle East
    • Rippersec
    • Bar-Ilan University

    Hacktivist Group RipperSec Targets Bar Ilan University

    On March 19th, 2025, the hacktivist group "RipperSec" claimed to have attacked the website of Bar-Ilan University. The group has provided evidence of its DDoS attack.

  • Mar 20, 2025

    • Insurance Agents, Brokers And Service
    • Systemadminbd
    • Asia
    • Finance
    • Turkiz
    • Israel
    • Middle East

    Hacktivist Group Systemadminbd Defaces Israeli Website

    On March 19th, 2025, the hacktivist group Systemadminbd claimed to have defaced an Israeli website, Turkiz. The group has provided evidence of its attack.

  • Mar 20, 2025

    • Business Services
    • Asia
    • 10Buy.Co.Il
    • Israel
    • Middle East
    • Anonymous Bd

    Hacktivist Group Anonymous BD Defaces 5 Israeli Websites

    On March 19th, 2025, the hacktivist group, Anonymous BD, claimed to have defaced 5 Israeli sites on the platform 10buy.co.il. The group has provided evidence of its attacks.

  • Mar 19, 2025

    • Western Europe
    • Hillshave
    • Europe
    • France
    • Luxury Watches
    • Technology

    Luxury-Watches - Breach- 2025-03-17

    A threat actor "HillShave" has leaked a database belonging to Luxury-Watches France, a website that sells high-end watches and diamonds and is based in Nice/Paris in France. According to the threat actor, the database includes about 100-200 unique emails and names.

  • Mar 19, 2025

    • Asia
    • Coreinjection
    • Israel
    • Middle East
    • Technology

    Threat Actor "CoreInjection" Sells Access To Israeli Digital Display Company

    On March 18, 2025, the threat actor CoreInjection claimed to have gained exclusive access to a prominent Israel-based company specializing in digital display solutions for shopping malls. The access includes control over 17 Windows servers, administrative permissions within the company’s advanced management systems, and direct entry to the central server managing the display inventory, allowing for immediate content control and propagation. The group also highlighted high-speed connectivity, ideal for data extraction or exfiltration. The asking price for this access is $100,000 USD, with payment accepted exclusively via cryptocurrency. On March 18th, a digital banner in an Israeli mall was hijacked with a message saying "Defaced by Coreinjection, Clal pay the ransom", the attack could relate to previous attacks claimed by the threat actor on Clal Insurance to pressure the victim.

  • Mar 19, 2025

    • Hadshon Hebrew
    • Education
    • Asia
    • Electronic Tigers Unit
    • Israel
    • Middle East

    Electronic Tigers Unit Claims DDoS Attack on Hadshon Hebrew in Israel

    On March 19th, 2025, the hacktivist group "Electronic Tigers Unit" claimed to have attacked Hadshon Hebrew, an Israeli educational platform. The group has provided evidence of its DDoS attack.

  • Mar 19, 2025

    • Government
    • Asia
    • Electronic Tigers Unit
    • Israel
    • Galilee Development Authority
    • Middle East

    Electronic Tigers Unit - DDoS - Galilee Development Authority - 2025-03-19

    On March 19th, 2025, the hacktivist group "Electronic Tigers Unit" claimed an attack on the website of the Galilee Development Authority, in Israel. The hacktivist group has provided evidence of its DDoS attack.

  • Mar 18, 2025

    • Automotive
    • Asia
    • Coreinjection
    • Israel
    • Middle East

    Threat Actor Sells Access To Israeli Automotive Company

    On March 16, 2025, the threat actor group CoreInjection claimed to have gained full access to the internal network and management email systems of a prominent international car company operating in Israel. The breach includes control over the company’s Israeli network infrastructure and direct access to high-level executive and managerial email accounts. The group is offering this access for sale at $50,000 USD.

  • Mar 18, 2025

    • Clal Insurance
    • Asia
    • Coreinjection
    • Finance
    • Israel
    • Middle East

    Threat Actor Claims to Have Breached Clal Insurance, Offers Database for 200 Thousand Dollars

    On March 17, 2025, the threat actor CoreInjection claimed to have stolen 400,000 customer policies and sensitive files from Clal Insurance, one of Israel's largest insurance companies. The leaked dataset includes detailed policy information for 400,000 customers, along with personally identifiable information (PII), financial data, and other confidential records. The threat actor is reportedly offering the data for sale at $200,000, with payment to be made exclusively via cryptocurrency.

  • Mar 17, 2025

    • United States
    • Coreinjection
    • North America
    • Manufacturing

    Sale of Admin Access to U.S. Industrial Firm Revealed on Dark Web

    A threat actor known as "CoreInjection" recently posted on the dark web forum "BreachForums" offering exclusive administrative command-line interface (CLI) and shell access to a major U.S.-based industrial machinery and equipment company. The sale, priced at $100,000, grants full administrative privileges to the company's remote management system, which could allow threat actors deep control over critical systems.

  • Mar 17, 2025

    • Apt37
    • Kospy

    New Android Spyware Kospy Linked to North Korean Threat Actor Scarcruft

    The North Korea-linked threat actor Scarcruft has been identified as the creator of a new Android surveillance tool named Kospy, which targets both Korean and English-speaking users. This malware, which has been active since March 2022, masquerades as legitimate utility applications on the Google Play Store to deceive users into downloading it. Kospy is capable of collecting extensive data from infected devices, including SMS messages, call logs, and location information, while utilizing a sophisticated command-and-control infrastructure that allows it to operate stealthily. The malware's plugins and configurations remain largely unknown, as the command servers are either inactive or unresponsive.

  • Mar 17, 2025

    • Education
    • Network Denial Of Service
    • Asia
    • Israel
    • Middle East
    • Shenkar College
    • Rippersec

    Hacktivist Group RipperSec Claims Attack on Shenkar College

    On March 16th, 2025, the hacktivist group RipperSec claimed to have taken down the website of Shenkar College. The hacktivist group has provided evidence of its DDoS Attack.

  • Mar 16, 2025

    • Rippersec
    • Pogrom.Org.Il
    • Network Denial Of Service

    Hacktivist Group RipperSec Claims Atack on pogrom.org.il

    On March 16th, 2025, the hacktivist group RipperSec claimed to have taken down the website of pogrom.org.il. The threat actor has provided evidence of its DDoS Attack

  • Mar 16, 2025

    • Business Services
    • Asia
    • Israel
    • Middle East
    • Ministry Of Education (Israel
    • Rippersec

    Hacktivist Group RipperSec Claims Attack on Israeli Ministry of Education

    On March 15th, 2025, the hacktivist group RipperSec claimed to have taken down the website of the Israeli Ministry of Education. The threat actor has provided evidence of its DDoS Attack

  • Mar 16, 2025

    • 4Sale Real Estate
    • Israel'S Traditional Chinese Medicine Association
    • Jokeir 07X
    • Israel
    • Lulzsec Black
    • Manufacturing
    • Se Lawfirm
    • Gufyprint.Co.Il
    • Heldstudio.Co.Il
    • Retail
    • Real Estate
    • Legal Services
    • Healthcare
    • Media
    • Asia
    • Sheket Team
    • Construction
    • Libi Studio
    • Jbags.Co.Il
    • Business Services
    • Stock Matok
    • Honigsfeld.Co.Il
    • Gadish-Maoz
    • Middle East
    • Miscellaneous Manufacturing Industries
    • Health Services
    • Netzz.Co.Il

    Hacktivist Groups Claim To Have Breached Israeli Web Hosting Server and to Have Deleted 12 Israeli Websites

    On March 14th, 2025, the hacktivist groups "LulzSec Black" and "Jokeir 07x" claimed to have gained access to an Israeli web hosting server and as a result, taken down 12 Israeli Sites, among those sites,

  • Mar 16, 2025

    • Government
    • Asia
    • Babuk2
    • Israel
    • Middle East
    • The Knesset

    Ransomware Group Babuk2 Claims to Have Attacked The Knesset

    On March 15th, the ransomware group "Babuk2" claimed to have attacked the Knesset, Israel's Parliament, and to have exfiltrated 910 GB of internal data, including more than 200 thousand documents. Babuk2 is selling the data, along with publishing a portion of the data on their DLS.

  • Mar 13, 2025

    • Turk Nokta Net
    • Hades_Hgs
    • Asia
    • Telecommunications
    • Middle East
    • Turkey

    Threat Actor Claims to Have Breached TurkNet

    In March 2025, a threat actor named hades_hgs claimed to have breached Turknet, a telecommunications company in Türkiye, and to have gained access to its database. According to the threat actor, approximately 2.8 million rows of data belonging to Turknet's customers were taken, including sensitive information such as customer IDs, contact details, addresses, usernames, and identification numbers.

  • Mar 13, 2025

    • National Telecommunications Commission
    • Government
    • Asia
    • Philippines
    • Luxurysp1D3R
    • South-Eastern Asia

    Threat Actor Claims to Have Breached the National Telecommunications Commission (NTC) of the Philippines

    In March 2025, a threat actor named LuxurySp1d3r claimed to have breached the National Telecommunications Commission (NTC) of the Philippines and to have gained access to its database. According to the threat actor, a critical dataset belonging to the NTC was taken, including sensitive information related to nationwide telecommunications operations, surveillance mechanisms, and user tracking systems.

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start