Point of View
OUR TAKE ON TRENDING STORIES Kim Dotcom, the mastermind behind MegaUpload, is finally getting extradited to the U.S. from his New Zealand hideaway. For those who don’t know, Kim ran MegaUpload, the notorious file-sharing site, from 2005 until 2012—right up until the FBI decided to crash the party. They shut down the site, seized the servers, and probably threw a few hard drives into the ocean for good measure. But Kim's been playing a game of international "hide and seek" ever since. Well, the game might be up because just 15 days ago, a New Zealand judge decided that Kim can finally be shipped off to the U.S. for his alleged piracy shenanigans.
The U.S. authorities claim that Mr. Dotcom and his three trusty sidekicks cost the film and music industry a whopping $500 million. Now, $500 million sounds like a lot—because it is—but to put it in Hollywood terms, that’s about one and a half Star Wars movies. Seriously, the 2015 "Star Wars: The Force Awakens" had a budget of $432 million! So, what’s a few hundred million between friends?
If Kim is indeed extradited, he’ll be facing three charges: money laundering, racketeering, and copyright infringement. Or as they call it in the underworld, the “hat trick.”
In a twist that no one saw coming, infamous hacker USDod has been doxed! Apparently, he got "crowd struck" and decided it was time to hang up his virtual hoodie for good. The 33-year-old, whose real name is Luan Goncalves, is now calling it quits and plans to surrender himself to the Brazilian authorities. Yes, you read that right—a hacker voluntarily turning himself in. What’s next, cats and dogs living together?
Luan’s no stranger to being doxed, but this time it seems he's finally had enough. Before you think he's going out with a whimper, let’s not forget he’s the brains behind some pretty serious data breaches, including the Infragard hack—a network of professionals who work with the FBI to protect U.S. critical infrastructure. Yeah, that kind of serious.
Other hackers in the community are wishing him luck and patting him on the back for his illustrious (if illegal) career. USDod, always one for dramatic exits, left a parting note on hackread.com: “This is not my end. Thank you; see you around. Don’t worry, Brazilian authorities, I’m coming to meet you; I’m not a threat; in fact, I can do much for my country.” Now, if that’s not a retirement speech, I don’t know what is.
In the latest episode of “Who Got Arrested Today?”, Pavel Durov, the enigmatic founder of Telegram, has reportedly been taken into custody. Naturally, this has caused quite the uproar online. If Telegram gets back-doored by the FBI, expect a mass exodus of threat actors, drug dealers, and privacy enthusiasts alike to the next best end-to-end encrypted (E2EE) platform.
Of course, it’s not like crime isn’t happening on other social media platforms. Instagram, Facebook, and Snapchat have their fair share of dodgy dealings, but those are all nicely under the control of Western authorities. But Telegram? That’s a whole different ball game. If the rumours are true, it's time to grab your usernames and get ready to migrate!
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
Finance company breached revealing 850 million records.
https://breachaware.com/research/finance-company-breached-revealing-850-million-records
A total of 15 breaches were found and analysed resulting in 65,131,591 leaked accounts containing a total of 24 different data types. The breaches found publicly and freely available included Pure Incubation Ventures, Eye4Fraud, APK, AvaTrade and Writers and Artists.
Health supplement maker failed to alert their three million customers of the breach.
https://breachaware.com/research/health-supplement-maker-failed-to-alert-their-three-million-customers-of-the-breach
A total of 31 breaches were found and analysed resulting in 8,514,163 leaked accounts containing a total of 24 different data types. The breaches found publicly and freely available included Piping Rock, Locally, Havenly, Bodog and Ragazzo Delivery.
DefCon conference gives local Las Vegas resort the jitters.
https://breachaware.com/research/defcon-conference-gives-local-las-vegas-resort-the-jitters
A total of 30 breaches were found and analysed resulting in 340,885,509 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Allegedly SOCRadar [USDoD], Rail Yatri, Wanelo [Update], Yatra and Youth Manual.
Previously trashed cybercrime forum is reopening.
https://breachaware.com/research/previously-trashed-cybercrime-forum-is-reopening
A total of 19 breaches were found and analysed resulting in 86,112,651 leaked accounts containing a total of 35 different data types. The breaches found publicly and freely available included Neiman Marcus, Zoosk 2020, Bukalapak, Heroes of Newerth and Zhenai
In our most recent weekly insight, we delved into the escalating drama within the underground cybercrime community, particularly focusing on a feud between two threat actors and the administrators of Breach Forums. The rift began when the threat actors were banned for doxing, a clear violation of the forum’s rules. One of the disgruntled hackers responded by leaking the entire official data leaks page of the forum.
Breach Forums features a marketplace where users buy credits to purchase data breaches. These credits are usually accumulated by selling breaches, leading to substantial collections for dedicated hackers. The banned threat actors, having amassed a significant number of breaches, decided to upload all the data for free on a file hosting site, undermining the forum’s revenue model which relies on credit purchases with cryptocurrencies. This move has set the stage for what promises to be a contentious and chaotic few weeks.
On the corporate front, AT&T recently disclosed a breach in an 8K report filed with the SEC, revealing a compromise initiated by the Shiny Hunters malware campaign. The breach originated from a data leak involving Snowflake, a cloud-based data platform, and affected over 150 companies. The breach first came to light when data from Ticketmaster appeared for sale on a notorious cybercrime forum. Despite SEC regulations mandating prompt disclosure, the FBI and DOJ granted AT&T two extensions due to potential national security risks.
In another twist, the FBI’s recent seizure of the Baphchat Telegram group has backfired. The group, associated with Baphomet and previously taken over during the FBI’s takedown of the OneBreach forum, has been reclaimed by a threat actor. A prominent threat actor and forum moderator celebrated the recovery, stating, "This is truly a heroic day for all of us and a shameful day for the FBI, who fumbled the seizure." The group’s link now proclaims, "This Telegram chat is under the control of Breachforums," and the chat is buzzing with threat actors rejoicing over the FBI’s blunder.
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
It's kicking off in the underground cyber crime community.
https://breachaware.com/research/its-kicking-off-in-the-underground-cyber-crime-community
A total of 25 breaches were found and analysed resulting in 29,695,958 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Trello, 7k7k, Sword Fantasy, Zaimer and Xiaomi.
Kaspersky is being booted out of the USA.
https://breachaware.com/research/kaspersky-is-being-booted-out-of-the-usa
A total of 9 breaches were found and analysed resulting in 2,948,750 leaked accounts containing a total of 14 different data types. The breaches found publicly and freely available included Avito, Lulu Hypermarket, The Cellula, Boutique Curly and NATO Wiki.
Husky owners breach spreads like wildfire.
https://breachaware.com/research/husky-owners-breach-spreads-like-wildfire
A total of 18 breaches were found and analysed resulting in 5,935,927 leaked accounts containing a total of 28 different data types. The breaches found publicly and freely available included Giant Tiger, Telegram Base 2019-2023, Stealer Log 0475, Stealer Log 0474 and Tattletale.
Doctors and physicians exposed, prime for phishing attacks.
https://breachaware.com/research/doctors-and-physicians-exposed-prime-for-phishing-attacks
A total of 32 breaches were found and analysed resulting in 32,522,728 leaked accounts containing a total of 35 different data types. The breaches found publicly and freely available included IndiHome, LenDenClub, USA Business Men & Investor Database, US Doctor's Database 2024 and Stealer log 0473.
"This is not white-hat hacking; it is extortion."
https://breachaware.com/research/this-is-not-white-hat-hacking-it-is-extortion
A total of 22 breaches were found and analysed resulting in 20,007,669 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Russian Electronic School, Stealer Log 0470, piZap, USA Mobile Device Management Software (MDM) User Database and Ticketmaster.
In the ever-dramatic world of cybercrime, a small dark-web forum has found itself in a downward spiral, now up for sale. As covered in our weekly insight, the forum was breached by an unknown threat actor, prompting the admin to panic and shut it down. This came just days after the admin had taken to Telegram to badmouth the threat actor community and insult Shiny Hunters, the admin of Breach Forums. It seems the forum’s admin couldn’t handle the backlash and is now throwing in the towel.
The admin has put the entire forum's database, Telegram channel, and domain up for sale. The database is priced at $8,000, the domain at $600, and the Telegram channel at $2,000. In a somewhat surprising move, users can request the removal of their details from the database for free. There are also unsettling rumours that a former admin or prominent member of the community has tragically committed suicide, casting a somber shadow over an already chaotic situation.
In a moment of schadenfreude for both the online community and law enforcement, the Lockbit ransomware group recently claimed to have breached the United States Federal Reserve. This audacious claim naturally raised eyebrows, but as the countdown timer for the authenticity of the documents hit zero, it turned out to be a misdirection. The actual target was Evolve Bank & Trust, not the Federal Reserve. The confusion likely stemmed from a document mentioning the "United States Federal Reserve," which the affiliate, probably not fluent in English, misinterpreted. VX Underground humorously summed up the situation, pointing out the likely language barrier issue.
Meanwhile, Europol’s "End Game" operation, their largest offensive against botnets, has resulted in the arrest of four individuals—one from Armenia and three from Ukraine. This crackdown has seen law enforcement seize control of 2,000 domains and 100 servers across Europe and the Americas. Although the market for stealer logs remains active, there has been a noticeable dip in availability. One of the main suspects is believed to have raked in over 69 million euros in cryptocurrency, illustrating the scale and profitability of these operations.
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
Administrators of $430 million dark web market have been arrested.
https://breachaware.com/research/administrators-of-430-million-dollar-dark-web-market-have-been-arrested
A total of 25 breaches were found and analysed resulting in 3,151,505 leaked accounts containing a total of 29 different data types. The breaches found publicly and freely available included mSpy, Stealer Log 0468, Kladzdor, Facebook [3] and Fit5.
Disgruntled employee wiped 180 virtual servers.
https://breachaware.com/research/disgruntled-employee-wiped-180-virtual-servers
A total of 20 breaches were found and analysed resulting in 19,990,155 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included Lumin [2], Scentbird [2], Stealer Log 0467, Respect-Shoes and Tecnova Group.
Company backed by Facebook co-founder suffers large data breach.
https://breachaware.com/research/company-backed-by-facebook-co-founder-suffers-large-data-breach
A total of 30 breaches were found and analysed resulting in 7,203,587 leaked accounts containing a total of 29 different data types. The breaches found publicly and freely available included 51, Zadig and Voltaire, Stealer Log 0465, T Bank and Danto.
Threat actor group expose data relating to Mexican cartels.
https://breachaware.com/research/threat-actor-group-expose-data-relating-to-mexican-cartels
A total of 31 breaches were found and analysed resulting in 2,177,382 leaked accounts containing a total of 32 different data types. The breaches found publicly and freely available included Unigame, One Vers, National Association of Judicial Sales Institutes, Stealer Log 0463 and THConnect.
The saga of Breach Forums continues with twists and turns. Just when the FBI thought they'd scored another victory by seizing the infamous Breach Forums and arresting its co-administrator Baphomet, the remaining admin pulled a digital rabbit out of the hat. Despite the initial seizure of both the clear-net and Tor domains, as well as the Telegram channel, the FBI's victory was short-lived. Mere hours after the domain was seized and added to the FBI's account, the account was suspended, and the domain fell back into the hands of the elusive threat actor. Emails between the FBI and the domain registrar detailing this blunder have since surfaced online.
The apparent end of Breach Forums was, in fact, just the beginning of a new chapter. In less than two weeks, a new admin known as Shiny Hunters resurrected the forum from old backups, launching a new Tor domain and fresh Telegram group. Not only is the clear-net site back up and running, but Shiny Hunters has also made headlines by offering the entire Live Nation/Ticketmaster database—containing 560 million users—for a cool $500k USD. The identity of the buyer remains unknown, adding another layer of intrigue to this unfolding story.
In another development, a breach impacting several American government agencies, including the US armed forces, has surfaced on dark web platforms. The notorious threat actor IntelBroker, known for his swift and effective hacks, claimed to have accessed sensitive data from the breached site in just "10–15 minutes." The compromised company, established to address the evolving landscape of maritime domain awareness, now finds itself at the centre of a significant data leak.
Meanwhile, a well-known threat actor group has announced a dramatic shift in focus. Declaring their departure from financially motivated cybercrime, they have pledged to return to their roots in hacktivism and political hacking. Their latest leak, though unverified, promises to be substantial. The group claims to have exposed sensitive information affecting various Mexican cartels, including the Sinaloa and Jalisco cartels. This leak allegedly stems from a variety of sources, including government sites, cartel-supported centres, and shops. The data dump also includes an in-depth research writeup detailing cartel operations and locations. Our team is currently sifting through the data to verify the claims and assess the implications.
It's been an action-packed month for cybersecurity professionals, and as always, the landscape continues to evolve with each passing day.
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
Threat actors will find this kind of data pretty handy.
https://breachaware.com/research/threat-actors-will-find-this-kind-of-data-pretty-handy
A total of 24 breaches were found and analysed resulting in 4,340,106 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included Kringle Cash, Stealer Log 0462, Games Nord, Money Man and NOSIS.
USDoD says that they're bringing Breach Forums back!
https://breachaware.com/research/usdod-says-that-theyre-bringing-breach-forums-back
A total of 25 breaches were found and analysed resulting in 61,491,599 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included The Post Millennial, Share This, Book 24, Stealer Log 0457 and Stealer Log 0459.
Hacker boasts it took “10–15 minutes” to steal data that included US armed forces.
https://breachaware.com/research/hacker-boasts-it-took-10-15-minutes-to-steal-data-that-included-us-armed-forces
A total of 35 breaches were found and analysed resulting in 4,063,408 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included ESN, Stealer Log 0456, SVR Labs, Kuchenland and Stealer Log 0455.
French clothing retailer has suffered a major cyber attack.
https://breachaware.com/research/french-clothing-retailer-has-suffered-a-major-cyber-attack
A total of 19 breaches were found and analysed resulting in 6,573,110 leaked accounts containing a total of 22 different data types. The breaches found publicly and freely available included Rendez-Vous, Stealer Log 0454, boAt Lifestyle, Expandia and Intergroup Gold.
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, including source code and client information, leaving the company's confidentiality in tatters. And if that weren't enough, they even dropped the CEO's personal details like it was hot gossip, suggesting a brazen breach via the company's VPN. One can only speculate whether the CEO's nonchalance stemmed from a hefty ransom payout or simply poor cybersecurity practices.
Meanwhile, Apple users worldwide received an unexpected jolt from the tech giant, courtesy of threat notifications warning of potential targeted attacks by none other than sophisticated threat actors. These aren't your run-of-the-mill alerts; they're the digital equivalent of a red alert, signalling the presence of high-value targets under the watchful eye of nation-state hackers or other nefarious entities. It's a call to arms for users to fortify their digital defences posthaste, with a direct line to cybersecurity professionals for backup.
And just when you thought the cyber landscape couldn't get any stranger, along comes a musical interlude courtesy of the malware analysis mavens over at VX Underground. An EDM anthem straight out of an anime fever dream, its lyrics lifted straight from the digital annals of LockBit 3.0's takedown saga. It may not be destined for the Billboard charts, but it's certainly a quirky addition to the cyber-culture canon.
In cybersecurity policy, the Biden Administration's U.S. Cyber Trust Mark initiative is gearing up for its grand debut. Designed to bolster the security of everyday IoT devices, this policy promises consumers greater transparency when navigating the maze of internet-connected gadgets. However, as the industry braces for this much-needed shake-up, lingering concerns persist over the prevalence of insecure IoT devices lurking in the market's shadows. It's a step in the right direction, to be sure, but the road to a cyber-safe future is paved with many a digital hurdle.
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
Huge amount of customer records exposed from the solar industry.
https://breachaware.com/research/huge-amount-of-customer-records-exposed-from-the-solar-industry
A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451.
You didn't have to be a brain surgeon to use the LabHost service.
https://breachaware.com/research/you-didnt-have-to-be-a-brain-surgeon-to-use-the-labhost-service
A total of 11 breaches were found and analysed resulting in 8,670,369 leaked accounts containing a total of 26 different data types. The breaches found publicly and freely available included A MONEY, Raychat, Bin Weevils, ZOON and Stealer Log 0450.
Apple warns users they may be targeted by a “mercenary spyware attack"
https://breachaware.com/research/apple-warns-users-they-may-be-targeted-by-a-mercenary-spyware-attack
A total of 15 breaches were found and analysed resulting in 10,110,194 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included US Environmental Protection Agency (EPA), Stealer Log 0448, Stealer Log 0449, Believe and Carding Team.
Well known threat actor is currently on a hacking spree.
https://breachaware.com/research/well-known-threat-actor-is-currently-on-a-hacking-spree
A total of 7 breaches were found and analysed resulting in 2,399,513 leaked accounts containing a total of 20 different data types. The breaches found publicly and freely available included PandaBuy, Stealer Log 0447, Leadzen, FICO and Koroleva.
US Cyber Trust Mark excludes internet-enabled medical equipment.
https://breachaware.com/research/us-cyber-trust-mark-excludes-internet-enabled-medical-equipment
A total of 35 breaches were found and analysed resulting in 9,841,487 leaked accounts containing a total of 24 different data types. The breaches found publicly and freely available included Stealer Log 0442, Kral Bros Garage, Stealer Log 0444, Stealer Log 0446 and DataCamp.
Ah, the dramatic saga of TikTok in the United States! Picture this: a ban looming over TikTok, akin to a dark cloud threatening to rain on our digital parade. Congress is all up in arms, waving their "think of the children" banners while TikTok nervously checks its watch, wondering if it should start packing its bags for a forced sale. Meanwhile, nobody bats an eye at the plethora of Chinese gadgets quietly infiltrating American households. It's like the ultimate game of "spot the double standard."
And then there's the Discord bot community, a bustling hub of over 170,000 members, blissfully unaware of the chaos brewing in its midst. Little did they know, a sneaky supply chain attack was underway, with cybercriminals slinging malware like digital ninja stars. The plot thickens as innocent developers unwittingly become pawns in this cyber chess match. It's like a scene straight out of a cyberpunk thriller, only with more Python packages and less neon.
But wait, there's more! Remember that telecom company caught in the data breach scandal of yesteryear? Well, guess who's back in the limelight! Cue the dramatic music as data allegedly linked to their previous mishap resurfaces, like a ghost from breaches past. The company's denial game is strong, but cybersecurity experts aren't buying it. With the FCC's new data breach notification rules hot off the press, it's like watching a high-stakes poker game unfold, with the company desperately trying to bluff its way out of trouble.
Ah, the cybersecurity world. Just when you think you've seen it all, it throws you another curveball. Stay tuned, folks. This digital rollercoaster ride is far from over!
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
Lithuanian police have “pulled the trigger” on seizing a dark web market place.
https://breachaware.com/research/lithuanian-police-have-pulled-the-trigger-on-seizing-a-dark-web-market-place
A total of 24 breaches were found and analysed resulting in 87,916,303 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included AT&T Division, US Consumer Opt In Records, Gosuslugi [2], Kava CasinoLife Poker and Stealer Log 0438.
"We got one final little nasty surprise for y’all." Exit scam on a new level!
https://breachaware.com/research/we-got-one-final-little-nasty-surprise-for-yall-exit-scam-on-a-new-level
A total of 27 breaches were found and analysed resulting in 12,280,942 leaked accounts containing a total of 30 different data types. The breaches found publicly and freely available included MyPertamina, Viet Loan, Movistar - Peru, Papa Johns Pizza - Moscow and Stealer Log 0437.
Exit scamming adding a new dimension to nefarious activities.
https://breachaware.com/research/exit-scamming-adding-a-new-dimension-to-nefarious-activities
A total of 22 breaches were found and analysed resulting in 38,890,296 leaked accounts containing a total of 28 different data types. The breaches found publicly and freely available included Cutout.Pro, Haijiao, LenDen App, R20 Digital and Stealer Log 0435.
Credentials unearthed from Stealer Logs continue to skyrocket.
https://breachaware.com/research/credentials-unearthed-from-stealer-logs-continue-to-skyrocket
A total of 15 breaches were found and analysed resulting in 1,263,339 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Stealer Log 0253, Uteka, Stealer Log 0252, Ultra Trade and Bmobile.
Well, well, well, it seems the digital waters are getting murkier by the day. A mysterious GitHub user by the name of I-SOON recently made their grand entrance onto the coding scene, dropping a repository bombshell titled "The Truth Behind an Xun." Inside? Oh, just a casual 200 megabytes of top-secret intel about a Chinese cybersecurity company. Talk about spilling the digital tea!
This treasure trove of data gives us a backstage pass into the shadowy world of state-sponsored hacking, courtesy of a company that, on the surface, offers cybersecurity courses and pen tests. But oh, there's so much more beneath the surface. The leaked documents, all 500 of them, paint a rather colourful picture of the company's not-so-innocent activities, spanning from the UK to the far corners of Asia.
And if that weren't enough, we've got juicy tidbits on spyware and hacking gadgets straight out of a Bond film. Imagine Android phones unwittingly spilling their guts when connecting to the same network as these nefarious devices. Oh, and let's not forget the pièce de résistance: a Twitter exploit playbook that's like a digital Trojan horse, granting attackers the keys to the Twitter kingdom with just one click on a shady link.
But wait, there's more! Among the treasure trove lies a white paper ominously titled "Twitter Public Opinion Guidance and Control System." Sounds like something straight out of a dystopian novel, doesn't it? Clearly, controlling overseas social public opinion is all the rage these days.
Meanwhile, down under, an Australian internet provider finds itself in some scorching hot water. Ever since cozying up to the Common Wealth Bank in 2021, they've found themselves in the midst of a security storm. Over 230 thousand users are left exposed after a security snafu of epic proportions. Despite assurances that they've slammed the door shut on network access, it seems the damage is done. Data types are now taking a leisurely stroll on the dark web, courtesy of this cyber debacle. Time to batten down the digital hatches, folks!
Breach Exposure Monitoring | Dark Web Monitoring + Surface Web Monitoring
Scan Any Domain for Free https://breachaware.com/scan
THIS MONTHS SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
Ransomware group responds following publicised joint operation.
https://breachaware.com/research/ransomware-group-responds-following-publicised-joint-operation
A total of 38 breaches were found and analysed resulting in 3,984,206 leaked accounts containing a total of 27 different data types. The breaches found publicly and freely available included Stealer Log 0248, Leonardo, Stealer Log 0249, Tangerine Telecom and Stealer Log 0250.
Ransomware group allowed affiliates to ransom a cancer treatment centre.
https://breachaware.com/research/ransomware-group-allowed-affiliates-to-ransom-a-cancer-treatment-centre
A total of 18 breaches were found and analysed resulting in 210,458,625 leaked accounts containing a total of 18 different data types. The breaches found publicly and freely available included demo.zerooq.com, Dunzo, Aussie Vapes, Stealer Log 0247 and Too Easy.
Alleged threat actor responsible for mental health provider breach caught.
https://breachaware.com/research/alleged-threat-actor-responsible-for-mental-health-provider-breach-caught
A total of 27 breaches were found and analysed resulting in 19,114,750 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Lime Leads [2], Stealer Log 0425, My Wallet, Toys’R’Us - Israel and 45Minut.
Hong Kong based luxury clothing company's API exploited.
https://breachaware.com/research/hong-kong-based-luxury-clothing-companys-api-exploited
A total of 20 breaches were found and analysed resulting in 5,576,986 leaked accounts containing a total of 20 different data types. The breaches found publicly and freely available included JPoint, Rina Orc, Blogigo, Tolgel88 and Stealer Log 0412.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Weekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESGlobal News Feed
POPULAR CYBERSECURITY PUBLICATIONSA researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.