Dark Web Informer :verified_paw:'s avatar
Dark Web Informer :verified_paw:
DarkWebInformer@infosec-exchange.mostr.pub
npub1xcpw...hx5s
Website: https://darkwebinformer.com If you would rather subscribe to the website via Crypto: https://darkwebinformer.com/crypto-payments Advertising (Only Legitimate Companies): https://darkwebinformer.com/advertising API Access: https://darkwebinformer.com/api-details/ Follow me on X: https://x.com/DarkWebInformer Dark Web Intel Bot on X: https://x.com/DarkWebIntelBot Discord: https://discord.gg/gDHTYz5N9D Telegram: https://t.me/SliceForLife Canary and All Socials: https://darkwebinformer.com/socials Updated: 2025-12-26
‼️ Dutch authorities just seized one Windscribe VPN server without a warrant, claiming they'll return it after they "fully analyze it." They say their real concern "is the unredacted Epstein files we had on there..." image
‼️ An international law enforcement operation called "Operation Switch off" has concluded, targeting what authorities describe as a large-scale illegal IPTV streaming network. Led by Italy's Catania Public Prosecutor's Office and coordinated through Eurojust, Europol, and Interpol, the investigation identified 31 individuals allegedly connected to a transnational criminal organization. The suspects face accusations including unauthorized broadcasting of access-controlled content, computer fraud, and money laundering. According to investigators, the network captured and redistributed live broadcasts and on-demand content from major platforms including Sky, DAZN, Amazon Prime, Netflix, Paramount, and Disney+, allegedly serving millions of users worldwide. More than 100 Italian Postal Police officers executed searches across 11 Italian cities and 14 international locations, with cooperation from authorities in the United Kingdom, Spain, Romania, Kosovo, Canada, India, South Korea, and the United Arab Emirates. The year-long investigation built on intelligence from a previous operation called "Taken Down." Authorities allege the suspects used cryptocurrency investments, shell companies, and fictitious asset registrations to obscure proceeds that reportedly generated millions of euros monthly. The operation disrupted approximately 1,000 Italian resellers and cut service to over 100,000 end users in Italy, with millions more affected globally. Three illegal IPTV platforms were seized in Italy, while investigators in Romania identified a significant distribution operation running six servers. The original video is in 360p. Source:
🚨RansomHouse Ransomware claims 3 victims 🇫🇮 Octomeca Oy 🇵🇭 Public Safety Mutual Benefit Fund 🇲🇹 Polidano Group image
🚨🇿🇦 Alleged Data Breach of Methodist Church of Southern Africa 📌 South Africa • Industry: Religious Organization / Education / Community Support • Threat Actor: Unlisted • Network: Clearnet, Dark Web Details: Threat actors claim to hold 150GB of data tied to the Methodist Church of Southern Africa. Reported revenue $14.2M. Allegedly includes internal documents, records, and community program data.
🚨🇺🇸 Alleged Sale of Salesforce Access to a U.S. Business Threat actor zoominfo is allegedly auctioning access to a company’s Salesforce account. The post claims 68M transaction records and a 9M “New Accounts” report available. ━━━━━━━━━ 📌 Key Details • Threat Actor: zoominfo • Category: Initial Access • Access: Salesforce tenant (US) • Data Preview: 68M transaction records, 9M New Accounts report • Auction Terms: Start $20,000 · Step $2,000 · Blitz $50,000 · Guarantor accepted, seller covers fee image
🚨🇺🇸 Alleged Sale of 300K+ U.S. Leads and Shopify Store Orders with Daily Data Feed 📌 United States • Industry: E-commerce / Retail • Threat Actor: XHJACK • Network: Clearnet, Dark Web • Forum: Exploit • Price: $0.8 per daily order | 4,500$ for 300K historical dataset (2020–2025) Details: The listing claims to offer a database of more than 300,000 customer records from a U.S.-based pet products Shopify store. The data is said to include names, email addresses, phone numbers, order histories, and physical addresses, with between 300 and 1,000 new orders reportedly available each day. The seller emphasizes that the dataset is untouched and unprocessed, with daily order data priced individually and the full 2020–2025 historical archive available as a bulk purchase. image
🚨Alleged Sale of njRAT v0.11G Source Code • Industry: Malware • Threat Actor: Richest • Network: Clearnet, Dark Web • Details: A threat actor is allegedly sharing the source code for njRAT v0.11G, a Remote Access Trojan (RAT) with capabilities such as remote desktop control, webcam access, microphone activation, keystroke logging, password extraction from browser history, file execution, USB spreading, and encrypted host communications. image
addy.io: Anonymous Email Forwarding. Protect your real email address using email aliases. Clearnet: Open-source: Features: Disposable email addresses, Custom domain support, Multiple inboxes, Catch-all address, Browser extensions, Email forwarding, Spam filtering, Alias generation, API access, Self-destructing addresses, Dark mode, PGP encryption support, Web interface, Email blocking rules, Open-source platform