LOCKBIT 5.0 ransomware group has added 2 new victims to their dark web portal.
⦁ SEVEN STARS RESORT & SPA 🇹🇨
⦁ Sands Suites Resort & Spa 🇲🇺
LOCKBIT 5.0 ransomware group has added 2 new victims to their dark web portal.
⦁ SEVEN STARS RESORT & SPA 🇹🇨
⦁ Sands Suites Resort & Spa 🇲🇺
NoName claims to have targeted multiple websites in Ukraine.
* ab.com.ua
* Joint-Stock Company “Meridian” named after S.P. Korolev
* phoenix-s.com.ua
* Ukrainian Federation of Security Professionals
* AutoKrAZ
* I.M. Frantsevich Institute for Problems of Materials Science of the NAS
NoName claims to have targeted multiple websites in Ukraine.
* ab.com.ua
* Joint-Stock Company “Meridian” named after S.P. Korolev
* phoenix-s.com.ua
* Ukrainian Federation of Security Professionals
* AutoKrAZ
* I.M. Frantsevich Institute for Problems of Materials Science of the NAS
JC Resorts (jcresorts.com). a US-based Hospitality & Tourism company has reportedly fallen victim to Qilin Ransomware.
🔍 Key Details:
🛡️ Threat actor: Qilin
📅 Reported on: 14-02-2026
⚠ Data Compromised: 350 GB
JC Resorts (jcresorts.com). a US-based Hospitality & Tourism company has reportedly fallen victim to Qilin Ransomware.
🔍 Key Details:
🛡️ Threat actor: Qilin
📅 Reported on: 14-02-2026
⚠ Data Compromised: 350 GB
BD Anonymous claims to have targeted the website of Japanese Commercial Arbitration Association (jcaa.or.jp).
BD Anonymous claims to have targeted the website of Japanese Commercial Arbitration Association (jcaa.or.jp).
Betesan (betesan.com), A Turkey-based engineering company specializing in ship electrical contracting, power and automation systems, and industrial electrical solutions has reportedly fallen victim to DragonForce Ransomware.
NB: They intend to publish data within 5–6 days.
Betesan (betesan.com), A Turkey-based engineering company specializing in ship electrical contracting, power and automation systems, and industrial electrical solutions has reportedly fallen victim to DragonForce Ransomware.
NB: They intend to publish data within 5–6 days.
Robbins Parking Service Ltd (robbinsparking.com), a Canada-based parking services provider, has reportedly fallen victim to Kairos Ransomware.
🔍 Key Details:
🛡️ Threat Actor: Kairos
⚠ Data Compromised: 300 GB
Robbins Parking Service Ltd (robbinsparking.com), a Canada-based parking services provider, has reportedly fallen victim to Kairos Ransomware.
🔍 Key Details:
🛡️ Threat Actor: Kairos
⚠ Data Compromised: 300 GB
The DragonForce Ransomware group has added 4 new victims to their dark web portal.
* Yem Chio Co
* Shining Labels
* SPIR STAR Asia
* MAIRIE DE FUMEL
The DragonForce Ransomware group has added 4 new victims to their dark web portal.
* Yem Chio Co
* Shining Labels
* SPIR STAR Asia
* MAIRIE DE FUMEL
The INSOMNIA Ransomware group has added 2 new victims to their dark web portal.
* The Syverson Group 🇺🇸
* Copier Careers 🇺🇸
The INSOMNIA Ransomware group has added 2 new victims to their dark web portal.
* The Syverson Group 🇺🇸
* Copier Careers 🇺🇸
Archaeological Institute of America (archaeological.org), a U.S.-based nonprofit organization dedicated to archaeological research, education, and preservation, has reportedly fallen victim to INTERLOCK Ransomware.
Archaeological Institute of America (archaeological.org), a U.S.-based nonprofit organization dedicated to archaeological research, education, and preservation, has reportedly fallen victim to INTERLOCK Ransomware.
Community Health Action of Staten Island (chasiy.org), a United States-based Hospital & Health Care organization, has reportedly fallen victim to GENESIS Ransomware.
NB: They intend to publish data within 5-6 days.
Community Health Action of Staten Island (chasiy.org), a United States-based Hospital & Health Care organization, has reportedly fallen victim to GENESIS Ransomware.
NB: They intend to publish data within 5-6 days.
The PLAY Ransomware group has added 5 new victims to their dark web portal.
* Heartland Title 🇺🇸
* UCG Associates, Inc. 🇺🇸
* Unified Engineering 🇨🇦
* HMA Public Relations 🇺🇸
* Lusamerica Foods Inc 🇺🇸
The PLAY Ransomware group has added 5 new victims to their dark web portal.
* Heartland Title 🇺🇸
* UCG Associates, Inc. 🇺🇸
* Unified Engineering 🇨🇦
* HMA Public Relations 🇺🇸
* Lusamerica Foods Inc 🇺🇸
The Gentlemen Ransomware group has added 8 new victims to their dark web portal.
* Gruppo Avanti 🇪🇨
* LSA International 🇬🇧
* Futurbath 🇪🇸
* White Beach Hotel 🇵🇭
* Smart Glass 🇪🇬
* Nile Air 🇪🇬
* City of New Castle Delaware 🇺🇸
* Yash Highvoltage Limited 🇮🇳
The Gentlemen Ransomware group has added 8 new victims to their dark web portal.
* Gruppo Avanti 🇪🇨
* LSA International 🇬🇧
* Futurbath 🇪🇸
* White Beach Hotel 🇵🇭
* Smart Glass 🇪🇬
* Nile Air 🇪🇬
* City of New Castle Delaware 🇺🇸
* Yash Highvoltage Limited 🇮🇳
The akira Ransomware group has added 2 new victims to their dark web portal.
* Ardene Holdings Inc 🇨🇦
* Michael Larson & Co., P.C. 🇺🇸
The akira Ransomware group has added 2 new victims to their dark web portal.
* Ardene Holdings Inc 🇨🇦
* Michael Larson & Co., P.C. 🇺🇸
The Marena Group, LLC. (marena.com), a US-based Medical Equipment Manufacturing company has reportedly fallen victim to Kairos Ransomware.
The Marena Group, LLC. (marena.com), a US-based Medical Equipment Manufacturing company has reportedly fallen victim to Kairos Ransomware.
BD Anonymous claims to have targeted the website of PrJSC DNIPROSPETSTAL (dss-ua.com).
BD Anonymous claims to have targeted the website of PrJSC DNIPROSPETSTAL (dss-ua.com).
RipperSec claims to have targeted the website of KEB Hana Global Finance Limited (kebhana.com)
NB : The site is up at the moment.
RipperSec claims to have targeted the website of KEB Hana Global Finance Limited (kebhana.com)
NB : The site is up at the moment.
NoName claims to have targeted multiple websites in Japan.
* Public Procurement Information Portal Site
* Aoimori Railway Co., Ltd.
* Konan Bus. Co.Ltd
* Govenment Procurement Information Portal
* Mizuho Securities Co., Ltd.
* SEIKAN-FERRY
NoName claims to have targeted multiple websites in Japan.
* Public Procurement Information Portal Site
* Aoimori Railway Co., Ltd.
* Konan Bus. Co.Ltd
* Govenment Procurement Information Portal
* Mizuho Securities Co., Ltd.
* SEIKAN-FERRY
Siem Srl (siem.it), an Italy-based management and coordination company has reportedly fallen victim to Space Bears by ransomware.
NB: The group intends to publish the data within 13-14 days.
🔍Key Details:
🛡️Threat actor: Space Bears
📅 Reported on: 13-02-2026
Siem Srl (siem.it), an Italy-based management and coordination company has reportedly fallen victim to Space Bears by ransomware.
NB: The group intends to publish the data within 13-14 days.
🔍Key Details:
🛡️Threat actor: Space Bears
📅 Reported on: 13-02-2026
Archxzen claims to have targeted the website of Aptoide (id.aptoide.com)
NB : The site is up at the moment
Archxzen claims to have targeted the website of Aptoide (id.aptoide.com)
NB : The site is up at the moment
Samkwang Co., Ltd. (samkwang.com), a South Korea-based manufacturing company specializing in plastic injection molding and precision components for mobile, automotive, electronic, and medical device sectors, has reportedly fallen victim to Anubis Ransomware.
Samkwang Co., Ltd. (samkwang.com), a South Korea-based manufacturing company specializing in plastic injection molding and precision components for mobile, automotive, electronic, and medical device sectors, has reportedly fallen victim to Anubis Ransomware.
Empire Express, Inc. (empireexpress.com), a U.S.-based trucking and transportation company providing freight services for apparel, air cargo, retail goods, electronics, cotton, packaging, and general commodities, has reportedly fallen victim to DragonForce Ransomware.
Empire Express, Inc. (empireexpress.com), a U.S.-based trucking and transportation company providing freight services for apparel, air cargo, retail goods, electronics, cotton, packaging, and general commodities, has reportedly fallen victim to DragonForce Ransomware.
Halcyon (halcyon.ai), a U.S.-based cybersecurity company specializing in AI-driven anti-ransomware and cyber-resilience solutions has reportedly fallen victim to Sinobi Ransomware.
NB: The group intends to publish the data within 9-10 days.
Halcyon (halcyon.ai), a U.S.-based cybersecurity company specializing in AI-driven anti-ransomware and cyber-resilience solutions has reportedly fallen victim to Sinobi Ransomware.
NB: The group intends to publish the data within 9-10 days.
Yelete (yelete.com), a United States-based Fashion & Apparel company, has reportedly fallen victim to DragonForce Ransomware.
NB: They intend to publish data within 2-3 days.
🔍 Key Details:
🛡️ Threat Actor: DragonForce
📅 Reported on: 12-02-2026
⚠ Data Compromised: 33.17 GB
Yelete (yelete.com), a United States-based Fashion & Apparel company, has reportedly fallen victim to DragonForce Ransomware.
NB: They intend to publish data within 2-3 days.
🔍 Key Details:
🛡️ Threat Actor: DragonForce
📅 Reported on: 12-02-2026
⚠ Data Compromised: 33.17 GB