💡Daily Dose of Dark Web Informer - 24th of April 2025
https://darkwebinformer.com/daily-dose-of-dark-web-informer-24th-of-april-2025/
24.4.2025 23:43💡Daily Dose of Dark Web Informer - 24th of April 2025https://darkwebinformer.com/daily-dose-of-dark-web-informer-24th-of-april-2025/💡Threat Attack Daily - 24th of April 2025
https://darkwebinformer.com/threat-attack-daily-24th-of-april-2025/
24.4.2025 23:01💡Threat Attack Daily - 24th of April 2025https://darkwebinformer.com/threat-attack-daily-24th-of-april-2025/💡Ransomware Attack Update for the 24th of April 2025
https://darkwebinformer.com/ransomware-attack-update-for-the-24th-of-april-2025/
24.4.2025 22:54💡Ransomware Attack Update for the 24th of April 2025https://darkwebinformer.com/ransomware-attack-update-for-the-24th-of-april-2025/The BreachForums drama will live on forever...
24.4.2025 20:21The BreachForums drama will live on forever...🚨RansomBay Ransomware-as-a-Service (RaaS) Relaunch by DragonForce
The threat actor group DragonForce has announced the relaunch and support of the RansomBay RaaS program, inviting affiliates who can meet strict conditions. They advertise the project as targeting Tier 1 countries with previous reported income reaching $150 million+.
🔸 Program Name: RansomBay
🔸 Type: Ransomware-as-a-Service (RaaS)
🔸 Backed By: DragonForce
🔸 Earnings Claimed: $150M+ (Tier 1 nations)
🔸 Access Links Provided:
🔹 Blog
🔹 Client Panel
🔹 FS Server
🧩 Features Offered:
🔹 Full automation of attack workflows
🔹 Admin/client panel, FS, and blog infrastructure
🔹 Support for ESXi, NAS, BSD, Windows
🔹 DragonForce Anti-DDoS protections
🔹 Scalable affiliate infrastructure
🔹 Claims support for all Windows encryption modes (full, header, partial)
💬 Affiliates are encouraged to apply only if conditions can be met.
24.4.2025 19:24🚨RansomBay Ransomware-as-a-Service (RaaS) Relaunch by DragonForceThe threat actor group DragonForce has announced the relaunch and...🚨SAP NetWeaver Vulnerability (CVE-2025-31324) Allows Remote Code Execution via File Upload Flaw
24.4.2025 19:15🚨SAP NetWeaver Vulnerability (CVE-2025-31324) Allows Remote Code Execution via File Upload...varfection
24.4.2025 19:02varfection🚨🇺🇸 DaVita Inc falls victim to INTERLOCK Ransomware
Samples: Financials, W-9 Forms, Confidentiality Agreements, more.
https://darkwebinformer.com/davita-inc-falls-victim-to-interlock-ransomware/
Researching threats or watching for your own info? Unfiltered breach data and live alerts keep you one step ahead—because what’s exposed is usually someone’s data. Sometimes, it’s yours.
🔒 https://darkwebinformer.com
Stay informed. Stay ahead.
🚨🇺🇸Arkansas Primary Care Clinic has Fallen Victim to INC RANSOM Ransomware
Samples: Financials, Names, Phone Numbers, Sensitive documents
https://darkwebinformer.com/arkansas-primary-care-clinic-has-fallen-victim-to-inc-ransom-ransomware/
24.4.2025 17:42🚨🇺🇸Arkansas Primary Care Clinic has Fallen Victim to INC RANSOM RansomwareSamples: Financials, Names, Phone Numbers, Sensitive...🚨🇨🇱Alleged Sale of Access to Multiple Unidentified Companies in Chile
https://darkwebinformer.com/alleged-sale-of-access-to-multiple-unidentified-companies-in-chile/
24.4.2025 17:12🚨🇨🇱Alleged Sale of Access to Multiple Unidentified Companies in...🚨🇲🇬Alleged Sale of Unauthorized Admin Access to Unidentified Online Course Platform in Madagascar
24.4.2025 17:00🚨🇲🇬Alleged Sale of Unauthorized Admin Access to Unidentified Online Course Platform in...🚨Alleged Leak of Data of Evilzone[.]st
https://darkwebinformer.com/alleged-leak-of-data-of-evilzone-st/
24.4.2025 16:09🚨Alleged Leak of Data of Evilzone[.]sthttps://darkwebinformer.com/alleged-leak-of-data-of-evilzone-st/🚨🇺🇸 Alleged SQLi Access to U.S.-Based OpenCart eCommerce Shop
A threat actor claims to have compromised a U.S. OpenCart store via a SQL injection vulnerability in the authorize[.]net direct payment form. The shop allegedly allows access to the admin panel and hashed admin credentials, with optional shell upload on request.
🔸 Platform: OpenCart
🔸 Vulnerability: SQLi (authorize[.]net direct form)
🔸 Access: Admin panel + hashed credentials
🔸 Extras: Shell upload upon buyer request
🔸 Traffic: 1–2 purchases per day
🔸 Additional Risk: Actor claims neighbors may also be vulnerable due to shared server setup
💰 Pricing:
🔹 Start: $100
🔹 Step: $50
🔹 Blitz: $500
🚨Breached[.]fi, breached already? Shocker!
24.4.2025 14:33🚨Breached[.]fi, breached already? Shocker!🚨The Elder Scrolls IV Oblivion Remastered-RUNE Leaks the Day of Release
https://darkwebinformer.com/the-elder-scrolls-iv-oblivion-remastered-rune-leaks-the-day-of-release/
23.4.2025 23:23🚨The Elder Scrolls IV Oblivion Remastered-RUNE Leaks the Day of...💡Daily Dose of Dark Web Informer - 23rd of April 2025
https://darkwebinformer.com/daily-dose-of-dark-web-informer-23rd-of-april-2025/
23.4.2025 23:16💡Daily Dose of Dark Web Informer - 23rd of April 2025https://darkwebinformer.com/daily-dose-of-dark-web-informer-23rd-of-april-2025/🚨New Ransomware Group: SatanLock
Onion: http://mgeegnexyhhn5dpqewihjy33qyhng3gy66h3fogiwefl5hljhtmfznad[.]onion
23.4.2025 22:50🚨New Ransomware Group: SatanLockOnion: http://mgeegnexyhhn5dpqewihjy33qyhng3gy66h3fogiwefl5hljhtmfznad[.]onion💡Threat Attack Daily - 23rd of April 2025
https://darkwebinformer.com/threat-attack-daily-23rd-of-april-2025/
23.4.2025 22:45💡Threat Attack Daily - 23rd of April 2025https://darkwebinformer.com/threat-attack-daily-23rd-of-april-2025/💡Ransomware Attack Update for the 23rd of April 2025
https://darkwebinformer.com/ransomware-attack-update-for-the-23rd-of-april-2025/
23.4.2025 22:36💡Ransomware Attack Update for the 23rd of April 2025https://darkwebinformer.com/ransomware-attack-update-for-the-23rd-of-april-2025/🚨 Alleged Sale of 568 GB Engineering & Commercial Data from 3ipe[.]com
A threat actor is offering a massive 568 GB dataset allegedly exfiltrated from 3ipe[.]com — a prominent infrastructure engineering firm active in Peru, Chile, Brazil, and Uruguay. The breach includes sensitive internal data tied to global airport, road, and civil projects.
🔸 Company: 3ipe.com
🔸 Sector: Infrastructure / Engineering
🔸 Countries: 🇵🇪 Peru, 🇨🇱 Chile, 🇧🇷 Brazil, 🇺🇾 Uruguay
🔸 Data Size: 568 GB
🔸 Languages: English & Spanish
📂 Alleged Contents:
🔹 Technical Docs (PDF, DOCX): Civil engineering standards, specifications, manuals
🔹 Project Data (XLSX): Bids, tenders, contracts, 2021–2024 airport projects
🔹 Marketing Media (JPG, MOV, MP4): Brand visuals, equipment showcase
🔹 Geo Data (KML): Transport maps for spatial analysis
🔹 Management Tools (XLSX Macros, DOCX): Internal workflows & automation
🔹 HR Archives: Internships, resumes, performance files
💡 Highlights:
🔹Claimed to be trusted & sourced directly from 3ipe systems
🔹Tailored for bidders, investors, and competitors
🔹Multilingual: English & Spanish
🔹Includes data labeled as exclusive, never-leaked
💰 Price:
🔹Starting: $12,000 (negotiable)
🔹Crypto: XMR
⬆️
⬇️