A threat actor named Zimmer is selling access to an online shop in Mexico running on Magento CMS with shell access and admin rights.
Starting price: $200.
A threat actor named 'SantaAd' is selling Forti VPN accesses in the United States, Canada, Colombia, and Bangladesh. Access types include domain admin, domain user, local user/guest, and zero session.
A threat actor named "Shiney" disclosed admin credentials to a Telefônica Brasil insurance CRM platform . The actor also published a URL as evidence of an IDOR vulnerability. A screenshot of the portal (Telefónica Insurance – TIM) was also published.
A threat actor named 'SantaAd' is auctioning access to a Mexican holding company operating in the energy and food industry sector. The access includes 282 hosts.
Starting price: $2,000.
A threat actor named “labladut” is selling access to a LinkedIn-verified company domain in Brazil (IT services & consulting, with 1.3k followers).
Price: $700–$1,500.
A threat actor named “361CrimeLiFe” is selling RDP access to a Brazilian agriculture company with $22M revenue, 390 employees, user domain access, 4 DCs, and 254 hosts. Price: $500–$1,800.
A threat actor named “Reassess” is offering unauthorized RDP access to multiple organizations in the USA and Costa Rica, including both Domain Admin and Domain User privileges.
Price: negotiable.
A threat actor named 'Reve' is auctioning access to two online shops in Puerto Rico and Costa Rica/Colombia. Both have WP Admin access with plugins enabled.
Starting price: $800
A threat actor named 'NarodArmiya' claims to be selling Administrator Access to University of Peru. The access allegedly includes full Admin Access to the website. Price: 1000$
A threat actor named 'xxtix' is selling initial access to a telecom company in Argentina. The access type is Shell and includes 133GB of internal data, with pivoting possibilities. Revenue is listed as $1.5 billion.
Price is negotiable.
A threat actor named ByteToBreach is selling full access to systems of Correos de Chile. The access includes remote code execution, reverse shell, credentials, configuration files, LDAP backups, audit logs, and cracked employee passwords.
A threat actor named decider is auctioning VPN-RDP access with Domain Admin rights to a company in Chile, operating in the agriculture sector. The company reportedly has over 40 machines in the domain and generates $17 million in revenue.
Starting pricing: $400
A threat actor named p0wershe11 is offering FortiNet VPN access with Domain Admin privileges to a company in the Dominican Republic. The targeted organization reportedly has a revenue of $13.5 million, and the access is being sold for $700.
A threat actor named Saturned33 is offering access to compromised systems from multiple countries, including Paraguay, Venezuela, USA, and others. The listings include shell and RDP access and target sectors like government, manufacturing, and electronics.
Prices: $400 to $1,300
A threat actor named Hashcat is auctioning a set of 1,000 Brazilian credit card records, claiming over 50% validity. The data includes card numbers, CVVs, and in some cases full details such as names, addresses, phone numbers, and CPFs.
Starting price: $1,200
A threat actor named shamirrrrious is selling access related to multiple countries, including Chile, France, and Germany. The listings mainly offer RDP, Domain User, and Local Admin access, often on Windows systems with large data volumes, with prices ranging from $100 to $1,000.
A threat actor named charley88 is auctioning access to a compromised Uruguayan online store running on OpenCart. The actor claims Admin + Database access.
Starting price: $600
A threat actor named leakman is auctioning approximately 18 GB of data allegedly from a shipping services company in Argentina. The listing mentions “Documentation File,” “PIL Accounting Reports,” and “Terminal” as part of the contents.
Starting price: $1,000
A threat actor named PacketSlut is selling full admin access to the cloud infrastructure of a major Latin American telecommunications company with annual revenues exceeding $9 billion. The actor claims control over AWS, VMware and production databases.
Price: 30k XMR
65 Followers 803 FollowingApasionado de las Tecnologías de la Información
y Comunicaciones y de la vida misma.
Se feliz no importa el lugar ni el momento
Solo hay que serlo y punto
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
3K Followers 392 FollowingThe Cyber Express is a publication that provides latest news and analysis about the information security industry. #cybersecurity #cyberexpress #news
2K Followers 30 FollowingHelping organizations respond to cyber incidents in the cloud |
🆘 24/7 support https://t.co/zfF62gimvm |
📚 Academy https://t.co/GH0u8tmjXJ
2K Followers 50 FollowingDEF CON Group 5411, #Hacking in Argentina 🇦🇷 & Uruguay 🇺🇾.
Led by @mauroeldritch & @larm182luis.
#ThreatIntel 🔍, #HardwareHacking 🤖 & #Exploits 👾.
4K Followers 103 Following🇨🇱 "This is the way" #OSINT #Ciberseguridad
Para seguimiento de dominios CL
🔗 https://t.co/6oIoeGFGul
🔗 https://t.co/WCaiqIgIyZ
6K Followers 4K Following#Chile-🇨🇱, Investigador Independiente cubro hacktivismo y filtraciones de datos en #LATAM y puedes encontrar mis noticias en:@_newschu & https://t.co/2nxsX7K3cE
5 Followers 4 FollowingCyber Safety and Threat Intelligence is a cybersecurity research organization committed to enhancing digital safety and advancing cybersecurity knowledge.
68 Followers 10 FollowingCTI is a Marlabs #CyberSecurity suite consisting of #AI driven nextgen security platform and a #CyberThreat hunting service against malicious attacks.
2K Followers 241 FollowingI help businesses and individuals enhance their cyber threat intelligence processes, develop their skills, and make CTI actionable.
2K Followers 44 FollowingOfficial account of the Cyber Threat Intelligence & Investigation team @Ledger
Our goal: to track down threats & make crypto and the internet safe for all
2K Followers 363 FollowingCurrently keeping the hamsters on treadmills sufficiently motivated in cyber threat intelligence. Got fired from Twitter before it was cool.
545 Followers 478 Following14+ years in cyber security, threat intelligence, OSINT & darkweb investigations. Uncovering threats & protecting organizations. fueled by coffee and cookies