Dark Web Informer :verified_paw:'s avatar
Dark Web Informer :verified_paw:
DarkWebInformer@infosec-exchange.mostr.pub
npub1xcpw...hx5s
Website: https://darkwebinformer.com If you would rather subscribe to the website via Crypto: https://darkwebinformer.com/crypto-payments Advertising (Only Legitimate Companies): https://darkwebinformer.com/advertising API Access: https://darkwebinformer.com/api-details/ Follow me on X: https://x.com/DarkWebInformer Dark Web Intel Bot on X: https://x.com/DarkWebIntelBot Discord: https://discord.gg/gDHTYz5N9D Telegram: https://t.me/SliceForLife Canary and All Socials: https://darkwebinformer.com/socials Updated: 2025-12-26
🚨RansomHouse Ransomware claims 3 victims 🇫🇮 Octomeca Oy 🇵🇭 Public Safety Mutual Benefit Fund 🇲🇹 Polidano Group image
🚨🇿🇦 Alleged Data Breach of Methodist Church of Southern Africa 📌 South Africa • Industry: Religious Organization / Education / Community Support • Threat Actor: Unlisted • Network: Clearnet, Dark Web Details: Threat actors claim to hold 150GB of data tied to the Methodist Church of Southern Africa. Reported revenue $14.2M. Allegedly includes internal documents, records, and community program data.
🚨🇺🇸 Alleged Sale of Salesforce Access to a U.S. Business Threat actor zoominfo is allegedly auctioning access to a company’s Salesforce account. The post claims 68M transaction records and a 9M “New Accounts” report available. ━━━━━━━━━ 📌 Key Details • Threat Actor: zoominfo • Category: Initial Access • Access: Salesforce tenant (US) • Data Preview: 68M transaction records, 9M New Accounts report • Auction Terms: Start $20,000 · Step $2,000 · Blitz $50,000 · Guarantor accepted, seller covers fee image
🚨🇺🇸 Alleged Sale of 300K+ U.S. Leads and Shopify Store Orders with Daily Data Feed 📌 United States • Industry: E-commerce / Retail • Threat Actor: XHJACK • Network: Clearnet, Dark Web • Forum: Exploit • Price: $0.8 per daily order | 4,500$ for 300K historical dataset (2020–2025) Details: The listing claims to offer a database of more than 300,000 customer records from a U.S.-based pet products Shopify store. The data is said to include names, email addresses, phone numbers, order histories, and physical addresses, with between 300 and 1,000 new orders reportedly available each day. The seller emphasizes that the dataset is untouched and unprocessed, with daily order data priced individually and the full 2020–2025 historical archive available as a bulk purchase. image
🚨Alleged Sale of njRAT v0.11G Source Code • Industry: Malware • Threat Actor: Richest • Network: Clearnet, Dark Web • Details: A threat actor is allegedly sharing the source code for njRAT v0.11G, a Remote Access Trojan (RAT) with capabilities such as remote desktop control, webcam access, microphone activation, keystroke logging, password extraction from browser history, file execution, USB spreading, and encrypted host communications. image
addy.io: Anonymous Email Forwarding. Protect your real email address using email aliases. Clearnet: Open-source: Features: Disposable email addresses, Custom domain support, Multiple inboxes, Catch-all address, Browser extensions, Email forwarding, Spam filtering, Alias generation, API access, Self-destructing addresses, Dark mode, PGP encryption support, Web interface, Email blocking rules, Open-source platform