<![CDATA[Dark Web Informer]]>https://darkwebinformer.com/https://darkwebinformer.com/favicon.pngDark Web Informerhttps://darkwebinformer.com/Ghost 6.22Sat, 21 Mar 2026 23:08:54 GMT60<![CDATA[World Monitor: A Free, Open-Source Global Intelligence Dashboard with 25 Data Layers and AI-Powered Threat Classification]]>https://darkwebinformer.com/world-monitor-a-free-open-source-global-intelligence-dashboard-with-25-data-layers-and-ai-powered-threat-classification/69bc4b1c3092aa0001860c32Thu, 19 Mar 2026 19:19:14 GMT
Tool Spotlight OSINT Open Source Mar 19, 2026

World Monitor: A Free, Open-Source Global Intelligence Dashboard with 25 Data Layers and AI-Powered Threat Classification

World Monitor: A Free, Open-Source Global Intelligence Dashboard with 25 Data Layers and AI-Powered Threat Classification

A real-time situational awareness platform that aggregates 100+ news feeds, military flight tracking, naval vessel monitoring, satellite fire detection, conflict zone mapping, and infrastructure data into a single interactive map with AI-synthesized intelligence briefs. Think Palantir, but open source and free.

koala73 / worldmonitor

Real-time global intelligence dashboard — AI-powered news aggregation, geopolitical monitoring, and infrastructure tracking in a unified situational awareness interface

TypeScript 80.5% JavaScript 10.2% CSS 9.1% ★ 41.1k stars MIT 6.7k forks 2,415 commits 74 contributors

OSINT tools that provide real-time geopolitical situational awareness have traditionally been either expensive commercial products or cobbled-together collections of individual data sources. World Monitor, by Elie Habib, is an open-source attempt to build a unified intelligence dashboard that aggregates military tracking, conflict monitoring, infrastructure mapping, news correlation, and AI-powered analysis into a single browser-based interface — and it's free.

With 41.1k stars, it's one of the fastest-growing OSINT projects on GitHub. The tool runs entirely in the browser with Vercel Edge Functions as a lightweight API layer, meaning there's no heavy backend to deploy. Two live variants are available: a geopolitical/military-focused version at worldmonitor.app and a tech-industry variant at tech.worldmonitor.app.

// The 25 Data Layers

⚔️
Geopolitical
Active conflict zones with escalation tracking, intelligence hotspots, social unrest events (ACLED + GDELT), sanctions regimes, weather alerts.
🎖️
Military & Strategic
220+ military bases, live flight tracking (ADS-B), naval vessel monitoring (AIS), nuclear facilities, APT cyber threat attribution, spaceports.
🏗️
Infrastructure
Undersea cables, oil/gas pipelines, 111 AI datacenter clusters, internet outages (Cloudflare Radar), critical mineral deposits, NASA FIRMS satellite fire detection.
📰
News & Video
100+ RSS feeds with source tiering and propaganda flagging, live video streams (Bloomberg, Sky News, Al Jazeera), entity extraction, custom keyword monitors.

// AI Intelligence Pipeline

News item arrives Keyword classifier (instant) LLM classifier (async) Geo-locate via 74-hub database Correlate with signals Map + Alert

Every news item passes through a two-stage threat classification pipeline. A keyword classifier matches against ~120 threat keywords organized by severity and returns instantly. A Groq Llama 3.1 8B LLM classifier fires asynchronously and overrides the keyword result only if its confidence is higher. Results are cached in Redis (24h TTL) keyed by headline hash, so subsequent users see pre-classified results. The UI is never blocked waiting for AI.

Beyond classification, the system runs several analytical modules: a Country Instability Index (CII) that computes real-time stability scores for 20 monitored nations, Focal Point Detection that correlates entities across news/military/protests/markets to identify convergence, and a Strategic Posture Assessment that combines all intelligence modules into a composite risk score with trend detection.

// Anomaly Detection & Signal Fusion

📊 Temporal Baseline Anomaly Detection
Rather than static thresholds, the system learns what "normal" looks like using Welford's online algorithm for streaming mean/variance computation per event type, region, weekday, and month over a 90-day window. Z-scores of 1.5/2.0/3.0 flag deviations like "Military flights 3.2x normal for Thursday (January)." A minimum of 10 historical samples is required before reporting anomalies.

The signal aggregation system fuses data from military flights, naval vessels, protests, satellite fires, AIS disruptions, internet outages, and news velocity into a unified geospatial picture. Events are binned into 1°×1° geographic cells, and when 3+ distinct event types converge in one cell within 24 hours, a convergence alert fires. This multi-signal approach means no single data source is trusted alone — escalation requires corroboration across independent channels.

// Architecture

ComponentTechnology
FrontendTypeScript, Vite, deck.gl (WebGL), MapLibre GL
AI/MLGroq (Llama 3.1 8B), TensorFlow.js (T5 fallback in-browser)
CachingRedis (Upstash) for cross-user AI deduplication
API Layer30+ Vercel Edge Functions (RSS proxy, data adapters, scrapers)
Data SourcesOpenSky, GDELT, ACLED, USGS, NASA FIRMS, FRED, Polymarket, Cloudflare Radar, AIS, 100+ RSS
DeploymentVercel (hosted), self-hosted Docker on roadmap

A key architectural choice is browser-first compute: analysis like clustering, instability scoring, surge detection, and convergence detection all run client-side. The Vercel Edge Functions serve primarily as CORS proxies, caching layers, and API key gatekeepers. This means the dashboard works with minimal backend dependency — a browser-side T5 model via TensorFlow.js even provides AI fallback when cloud endpoints are unavailable.

// Source Credibility

Every RSS feed is assigned a source tier (Tier 1: wire services like Reuters/AP; Tier 2: major outlets like CNN/NYT; Tier 3: specialized defense publications; Tier 4: aggregators/blogs) plus a propaganda risk rating and state affiliation flag. State-affiliated sources (RT, Xinhua, IRNA) are included for completeness but visually tagged. Threat classification confidence is weighted by source tier — a Tier 1 breaking alert carries more weight than a Tier 4 blog post in the focal point algorithm.

// Considerations

⚠️ Analytical Limitations
World Monitor is an aggregation and visualization tool, not a vetted intelligence product. The AI classifications, instability scores, and convergence alerts are algorithmic outputs that should be treated as indicators for further investigation, not ground truth. Baseline country risk scores and conflict zone floors are hard-coded editorial decisions.

API key dependencies. Full functionality requires API keys from Groq, Upstash Redis, OpenSky, VesselFinder, and NASA FIRMS. The tool works without them (falling back to browser-side ML and reduced data layers), but the experience is significantly degraded without the external data sources.

No self-hosted Docker yet. The current architecture is optimized for Vercel deployment with Edge Functions. A self-hosted Docker image is on the roadmap but not yet available. Users who can't or won't use Vercel will need to adapt the edge functions to a different hosting model.

Data source reliability. The system monitors 14 data sources for freshness and explicitly reports intelligence gaps when sources go stale or fail. This is a good design pattern, but the quality of the intelligence picture is fundamentally limited by the availability and accuracy of upstream sources like GDELT, ACLED, and ADS-B transponder data.

Prediction market integration. The system uses Polymarket geopolitical markets as leading indicators, which is an interesting signal but comes with obvious caveats about market liquidity, manipulation risk, and the gap between market probability and real-world likelihood.

// Bottom Line

World Monitor is remarkably ambitious for an open-source project. The combination of 25 data layers, multi-signal anomaly detection, AI-powered threat classification with a hybrid keyword/LLM pipeline, temporal baseline learning, geographic convergence detection, and source credibility scoring puts it in territory that was previously the domain of expensive commercial OSINT platforms.

The 41.1k stars reflect genuine demand for accessible geopolitical intelligence tooling. The architecture is thoughtful — browser-first compute, graceful degradation when APIs fail, explicit intelligence gap reporting, and the "speed over perfection" approach of instant keyword classification with async LLM refinement. For OSINT practitioners, security analysts, journalists, or anyone who needs a real-time global picture, World Monitor is the most comprehensive free option available.

]]>
<![CDATA[Daily Dose of Dark Web Informer - March 18th, 2026]]>https://darkwebinformer.com/daily-dose-of-dark-web-informer-march-18th-2026/69bb18f33092aa000185fcf0Wed, 18 Mar 2026 21:38:41 GMT Dark Web Informer — Daily Threat Intelligence Digest

Daily Threat Intelligence Digest

⚡ Real-Time Monitoring
🔑
API Access Available
Daily Dose of Dark Web Informer - March 18th, 2026

High-volume threat intelligence, ransomware data, IOC exports, and comprehensive feed access for security teams and researchers.

Explore API →
🔁 Follow across all official platforms — darkwebinformer.com/socials
🔥
Advertising Opportunities

Reach a highly engaged audience of 35,800+ unique users monthly and growing. View details

35.8k
Unique Visitors
89.3k
Pageviews

Last 30 days as of Mar 2, 2026. Next update Mar 31st.

🔒

Unlock Premium Intelligence

Real-time breach tracking, expert analysis, high-resolution evidence, unredacted feeds, and 5,100+ blog posts. View all plans and features on the pricing page.

View Plans & Subscribe →
💚

Support Dark Web Informer

Contributions help continue monitoring threats and keeping the community informed.

🟠
MoneroXMR
89Z68A33B9sNRf941f5GczU4ZzarTQsWn6dyMVUbo6mk2zYEamh9hALH1odMiVZfynKhjKPS58ASAfDyFdTW9o29Mwf4ArZ Copied
🟡
BitcoinBTC
bc1qvs4pfwascp2uln90g3e3l4agnhnjrdn2t578we Copied
🔷
EthereumETH / ERC-20 / USDT
0xbA6bCf2BF50F9789504401AFbf19E8c2CCaa773D Copied

Click address to copy · ETH address accepts USDT, USDC, and other ERC-20 tokens

📌 Legend

📰Law Enforcement — LEA updates, investigations
⚠️Dark Web Notices — forums, markets, announcements
❗️Urgent Threats — breaches, ransomware, vulnerabilities
💡Insights & Tools — guides, OSINT, learning resources
🔒Subscribers OnlyX/Twitter subscribe

🧾 Today's Intelligence

X/Twitter Updates
DWI Intel Feed
]]>
<![CDATA[Metropolitan Police Seize Dark Web Drug Marketplace With Nearly £2 Million in Annual Sales]]>https://darkwebinformer.com/metropolitan-police-seize-dark-web-drug-marketplace-with-nearly-2-million-in-annual-sales/69baf4c53092aa000185fcb6Wed, 18 Mar 2026 18:57:38 GMT

A dark web marketplace responsible for millions of pounds in illegal drug transactions has been taken down following an undercover operation by the Metropolitan Police.

The site, called AEGIS Marketplace, first came to the attention of the Met's Cyber Crime Unit in June 2025. It operated as a platform where individual vendors could list drugs for sale, with buyers paying via cryptocurrency.

By March 2026, the marketplace had grown to include 30 active sellers and was believed to have facilitated roughly 10,000 drug transactions over the course of ten months, generating an estimated annual turnover close to £2 million.

Officers successfully infiltrated the platform and obtained server data, which enabled them to identify site administrators, sellers, and customers. Anyone attempting to visit the site now encounters a banner reading "this website has been seized." Investigators are continuing to work through the data with the aim of bringing prosecutions against those involved.

Metropolitan Police Seize Dark Web Drug Marketplace With Nearly £2 Million in Annual Sales

Will Lyne, who heads the Met's Economic and Cyber Crime division, said the operation demonstrated the force's commitment to dismantling complex digital platforms and disrupting criminal networks. He warned that offenders who believe the dark web offers them a shield from law enforcement should reconsider.

The takedown comes amid a broader wave of international cybercrime enforcement actions in recent months, including operations targeting stolen data forums and large-scale phishing networks across dozens of countries.

]]>
<![CDATA[Alleged Breach of Tanzania's BRELA Government Database Exposes 10.2 Million Records Including 8 Million Individuals]]>https://darkwebinformer.com/alleged-breach-of-tanzanias-brela-government-database-exposes-10-2-million-records-including-8-million-individuals/69bae4843092aa000185fc8fWed, 18 Mar 2026 17:50:17 GMT
Dark Web Informer - Cyber Threat Intelligence

Alleged Breach of Tanzania's BRELA Government Database Exposes 10.2 Million Records Including 8 Million Individuals

March 18, 2026 - 1:38:37 PM UTC
Tanzania
Government
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-18 13:38:37 UTC
Threat Actor Spirigatito
Victim BRELA (Tanzania)
Industry Government
Category Data Breach
Alleged Records 10.2 Million
Individuals Affected ~8 Million
Databases 6
Price Credits (Crypto)
Breach Date February 4, 2026
Network Open Web
Country Tanzania

Incident Overview

Alleged Breach of Tanzania's BRELA Government Database Exposes 10.2 Million Records Including 8 Million Individuals

A threat actor going by Spirigatito claims to have compromised Tanzanian government infrastructure linked to BRELA (The Business Registrations and Licensing Agency), allegedly retrieving 10.2 million records that include data on approximately 8 million individuals. The actor states the breach occurred on February 4, 2026, and that after the Tanzanian government chose to ignore them, they decided to make the data available for purchase through a dedicated marketplace.


Rather than selling the data as a single dump, the actor has built a custom storefront that organizes the stolen records across 6 curated databases, each priced in credits that can be recharged via cryptocurrency (BTC, ETH, USDT, XMR, and 50+ other cryptocurrencies through OxaPay). The databases and their record counts are:

  • Business Names (Registry): 369K records containing registered business names, sole proprietors, and trade names with full applicant info, location, owner details, and activities. Priced at 2 credits.
  • Companies (Corporate): 279K records of limited companies with full incorporation data, directors, share capital, registered address, and filing history. Priced at 5 credits.
  • Corporate Shareholders (Equity): 7K records of shareholder records, equity positions, beneficial ownership, and stake changes. Priced at 8 credits.
  • People (Contacts): 2.2 million records of individual profiles with verified contact information, demographics, and location data. Priced at 3 credits.
  • TRA TINs (Tax): 7.4 million Tax Identification Numbers from the Tanzania Revenue Authority registry. Priced at 4 credits.
  • Wabunge (Government): 407 records of Members of Parliament with constituency data, party affiliations, and contact records. Priced at 6 credits.

The marketplace offers data in CSV or JSON format with automatic downloads, preview data and field descriptions for each database, and promotes itself as offering leads from Tanzanians for low cost. The actor also notes that the entire database is still available for bulk purchase. This represents a significant government data breach affecting a substantial portion of Tanzania's formally registered population, business ecosystem, and tax records.

Compromised Data Categories

Business Registration Records Corporate Incorporation Data Director & Officer Details Shareholder & Equity Records Individual Contact Information Demographics & Location Data Tax Identification Numbers (TINs) Parliamentary Records Party Affiliations Business Owner Details

Image Preview

Alleged Breach of Tanzania's BRELA Government Database Exposes 10.2 Million Records Including 8 Million Individuals Alleged Breach of Tanzania's BRELA Government Database Exposes 10.2 Million Records Including 8 Million Individuals

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
Subscriber Access View the original listing URL and unredacted claim images on the feeds below.
]]>
<![CDATA[Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities]]>https://darkwebinformer.com/sector-drainer-advertised-as-crypto-wallet-drainer-as-a-service-with-0-day-phantom-bypass-hidden-drain-and-autowithdraw-capabilities/69badce23092aa000185fc6fWed, 18 Mar 2026 17:17:22 GMT
Dark Web Informer - Cyber Threat Intelligence

Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities

March 18, 2026 - 1:06:24 PM UTC
N/A
Cryptocurrency / Cybercrime
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-18 13:06:24 UTC
Threat Actor SectorD
Service Name Sector Drainer
Category Drainer-as-a-Service (DaaS)
Severity High
Wallets Supported 150+
Revenue Model 80/20 Revshare
Claimed Profits >$4M (Team Total)
Network Open Web
Active Since 2024 (Claimed)

Incident Overview

Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities

A threat actor going by SectorD is advertising a drainer-as-a-service platform called Sector Drainer, marketed as a full-stack crypto wallet draining solution with claimed 0-day exploits, scam warning bypasses, and turnkey phishing infrastructure. The actor claims the operation has been running since 2024 with hundreds of partners and over $4 million in total team profits.


The listing is broken into several capability categories:

  • Exploit Capabilities: Claims a 0-day Phantom exploit that bypasses Lighthouse and Safeguard protections to perform hidden drains starting from assets as low as $5-10. The service also claims hidden drain functionality across all wallets updated through 2025-2026, fake token receiving via honeypot techniques, and unique spoofing for Trust Wallet, Phantom, MetaMask, and Rabby.
  • Security Bypasses: Claims to bypass scam warnings on Phantom, MetaMask, SEAL, Blockaid, Hashdit, Scam Sniffer, and WalletGuard. Also claims full bypass of in-app browsers on Telegram, X (Twitter), and Discord.
  • Drainer Features: Supports over 150 wallets with deep link and QR code connection methods. Capable of draining TRC20, BEP20, ETH, SOL tokens, NFTs, native staked assets, and DeFi positions. Includes gasless transactions via fee sponsorship, automatic profit splitting, and autowithdraw that triggers on any victim wallet top-up with no expiration. Claims wallet scan times under 0.4 seconds and transaction confirmation under 0.8 seconds on self-hosted infrastructure with no external API dependencies.
  • Infrastructure: Includes free domains, hosting, cloaking, and DDoS protection. Provides 70+ pre-built landing pages for fake airdrops, mints, claims, and similar lures, along with a landing generation tool, site copying capabilities, and an advanced landing API.
  • Business Model: Operates on a revshare basis starting at 80/20 (partner keeps 80%) scaling to 90/10 after reaching $5-10K in stolen funds. Minimum deposit varies, with some examples listing $1,000. Setup is claimed to take 10 minutes.

Worth noting that the actor's forum account was created in March 2026 with only 1 post, 1 thread, and 0 reputation, which is a common profile for newly registered accounts advertising DaaS platforms. The listing includes a high-conversion wallet connect UI/UX claim of over 95%, 24/7 support via Telegram, and full documentation. The actor directs interested parties to contact via Telegram or Session messaging.

Targeted Assets & Platforms

Phantom Wallet MetaMask Trust Wallet Rabby Wallet 150+ Additional Wallets ETH / ERC-20 Tokens SOL / SPL Tokens TRC-20 / BEP-20 Tokens NFTs Native Staked Assets DeFi Positions Telegram In-App Browser X (Twitter) In-App Browser Discord In-App Browser

Image Preview

Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
Subscriber Access View the original listing URL and unredacted claim images on the feeds below.
]]>
<![CDATA[Alleged Breach of Daryn Online Exposes 4 Million User Records From Kazakhstan's Largest Education Platform]]>https://darkwebinformer.com/alleged-breach-of-daryn-online-exposes-4-million-user-records-from-kazakhstans-largest-education-platform/69bad1393092aa000185fc49Wed, 18 Mar 2026 16:26:34 GMT
Dark Web Informer - Cyber Threat Intelligence

Alleged Breach of Daryn Online Exposes 4 Million User Records From Kazakhstan's Largest Education Platform

March 18, 2026 - 6:21:24 AM UTC
Kazakhstan
Education
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-18 06:21:24 UTC
Threat Actor Shinchan
Victim Daryn Online (daryn.online)
Industry Education
Category Data Breach
Alleged Records ~4 Million Users
Data Size 1 GB+
Price Contact Seller
Network Open Web
Country Kazakhstan

Incident Overview

Alleged Breach of Daryn Online Exposes 4 Million User Records From Kazakhstan's Largest Education Platform

A threat actor going by Shinchan claims to be selling a full user database from Daryn Online, one of Kazakhstan's largest online education platforms. Launched in 2019 and backed by Bugin Holding, the platform offers 28 different educational services including school curriculum support, national exam preparation (ENT/UBT), robotics courses, and art programs, reportedly serving over 3.5 million active users across the region.


The actor is selling the complete dataset only, with no partial sales available. The listing specifies the following data fields are included:

  • Personal Information: First names, last names, and birthdates for each user account.
  • Contact Data: Phone numbers and email addresses.
  • Credentials: Passwords, remember tokens, email hash tokens, and mobile tokens, which could allow direct account takeover if the tokens are still valid.
  • Profile Data: Avatar URLs and associated profile details.
  • Scale: Approximately 4 million user records totaling over 1GB of data.

The inclusion of authentication tokens alongside passwords makes this particularly dangerous. Even if passwords have been changed, valid remember tokens or mobile tokens could still grant access to user accounts without needing the updated credentials. Given the platform's user base consists largely of students, many of the affected individuals are likely minors. The actor provided data proof screenshots and sample records to demonstrate authenticity, and is directing buyers to contact them via Telegram or Session for pricing.

Compromised Data Categories

Full Names Phone Numbers Email Addresses Passwords Authentication Tokens Email Hash Tokens Mobile Tokens Birthdates Avatar / Profile Data

Image Preview

Alleged Breach of Daryn Online Exposes 4 Million User Records From Kazakhstan's Largest Education Platform Alleged Breach of Daryn Online Exposes 4 Million User Records From Kazakhstan's Largest Education Platform

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
]]>
<![CDATA[Partial Leak of Knownsec Corporate Documents Resurfaces With Espionage Tradecraft, Offensive Cyber Tools, and Global Targeting Evidence]]>https://darkwebinformer.com/partial-leak-of-knownsec-corporate-documents-resurfaces-with-espionage-tradecraft-offensive-cyber-tools-and-global-targeting-evidence/69bac3393092aa000185fc30Wed, 18 Mar 2026 15:24:27 GMT
Dark Web Informer - Cyber Threat Intelligence

Partial Leak of Knownsec Corporate Documents Resurfaces With Espionage Tradecraft, Offensive Cyber Tools, and Global Targeting Evidence

March 18, 2026 - 12:56:35 AM UTC
China
Cybersecurity / Government
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-18 00:56:35 UTC
Threat Actor Blastoize
Victim Knownsec (知道创宇)
Industry Cybersecurity / Government
Category Corporate Document Leak
Leak Status Partial Download
Original Breach November 2025
Original Documents 12,000+ Classified Files
Price Free (Partial Leak)
Network Open Web
Country China
Severity Critical

Incident Overview

Partial Leak of Knownsec Corporate Documents Resurfaces With Espionage Tradecraft, Offensive Cyber Tools, and Global Targeting Evidence

A threat actor going by Blastoize has posted a partial download of corporate documents from Knownsec, a major Chinese cybersecurity firm with well-documented ties to the Chinese government and military. This is not a new breach but rather a redistribution of data from the original Knownsec leak that first surfaced in November 2025, which has been widely regarded as one of the most significant exposures of state-sponsored cyber capabilities in recent years.


The actor references reporting from both Gopher Security and Resecurity that provide extensive analysis of the leaked material. The original breach exposed over 12,000 classified documents and revealed the inner workings of a firm that operates at the intersection of China's commercial cybersecurity sector and its state intelligence apparatus. Key revelations from the original leak include:

  • Offensive Cyber Tools: Remote Access Trojans (RATs) engineered for Linux, Windows, macOS, iOS, and Android, plus Android-specific malware designed to extract message histories from Chinese chat applications and Telegram.
  • Hardware Attack Vectors: Physical devices including a malicious power bank engineered to covertly upload data from victims' devices while appearing to function as a standard charger.
  • Global Target Lists: Spreadsheets documenting over 80 overseas targets across more than 20 countries, including government agencies, telecommunications providers, and critical infrastructure operators.
  • Stolen Data at Scale: Evidence of massive exfiltration operations including 95GB of Indian immigration records, 3TB of South Korean call records from LG U Plus, and 459GB of Taiwanese road planning data.
  • Government Collaboration: Documents showing direct collaboration with Chinese government agencies including Chinese Police No.3 Research Department on data collection and network entity research projects.
  • Internal Surveillance: Tools used not only externally against foreign targets but also internally to track Chinese companies and individuals for intelligence, control, and counterintelligence purposes.

The Chinese government has officially denied and downplayed the incident. When questioned, the Chinese Foreign Ministry stated they were unaware of any breach at Knownsec and reiterated that China "firmly opposes and combats all forms of cyberattacks." Resecurity's analysis suggests the source of the original leak was likely an insider (rogue employee) rather than an external hack, drawing parallels to the i-Soon leak that exposed similar state-linked cyber operations in 2024. The fact that this data continues to resurface and circulate months later underscores its significance to the threat intelligence community.

Exposed Data Categories

Classified Corporate Documents Offensive Cyber Tool Source Code Remote Access Trojans (RATs) Hardware Attack Tool Specifications Global Surveillance Target Lists Government Collaboration Records Stolen Foreign Government Data Telecommunications Intercept Records Critical Infrastructure Intelligence Internal Operational Procedures

Image Preview

Partial Leak of Knownsec Corporate Documents Resurfaces With Espionage Tradecraft, Offensive Cyber Tools, and Global Targeting Evidence

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe

MITRE ATT&CK Mapping

T1587.001 Develop Capabilities: Malware
Develops custom malware including RATs for multiple operating systems, enabling persistent remote access to compromised targets worldwide.
T1195.002 Supply Chain Compromise: Software
Uses hardware-based attack tools like modified power banks to covertly exfiltrate data from victims' devices through supply chain manipulation.
T1005 Data from Local System
Collects massive volumes of data from compromised systems, including immigration records, telecom call logs, and critical infrastructure data across multiple countries.
T1059 Command and Scripting Interpreter
Deploys cross-platform RATs that execute commands and scripts on victim machines across Linux, Windows, macOS, iOS, and Android environments.
T1557 Adversary-in-the-Middle
Intercepts communications and data in transit, evidenced by the 3TB of telecom call records exfiltrated from South Korean provider LG U Plus.
T1592 Gather Victim Host Information
Uses ZoomEye, Knownsec's global vulnerability scanning tool, to map and enumerate target infrastructure, building a Critical Infrastructure Target Database prioritizing Taiwan, the US, Japan, India, and Korea.
T1199 Trusted Relationship
Leverages Knownsec's position as a trusted cybersecurity provider to access client systems and government networks under the guise of legitimate security services.
T1048 Exfiltration Over Alternative Protocol
Transfers massive stolen datasets out of target environments using alternative channels, with documented exfiltration of hundreds of gigabytes per operation.
]]>
<![CDATA[changedetection.io: Self-Hosted Website Change Monitoring with 30k Stars and 203 Releases]]>https://darkwebinformer.com/changedetection-io-self-hosted-website-change-monitoring-with-30k-stars-and-203-releases/69b9908b3092aa000185fac3Tue, 17 Mar 2026 17:36:10 GMT
Tool Spotlight Monitoring Open Source Mar 15, 2026

changedetection.io: Self-Hosted Website Change Monitoring with 30k Stars and 203 Releases

changedetection.io: Self-Hosted Website Change Monitoring with 30k Stars and 203 Releases

A self-hosted tool that watches web pages for changes and sends you alerts via Discord, Slack, Telegram, email, and 80+ other notification channels. Supports visual element selection, browser automation steps, price/restock tracking, JSON API monitoring, PDF changes, and conditional triggers. Docker one-liner to deploy.

dgtlmoon / changedetection.io

Best and simplest tool for website change detection, web page monitoring, and website change alerts.

Python 80.9% HTML 7.6% JavaScript 7.3% ★ 30.7k stars v0.54.4 Apache-2.0 1.7k forks 2,249 commits 125 contributors

There's a surprisingly large category of problems that boil down to "tell me when this web page changes." Price drops on a product you're watching. Government regulatory updates that only appear on a website. Job postings on a company's careers page. A PDF that gets silently updated. Restock alerts. Security advisories. Legal document revisions. The list goes on.

changedetection.io is a self-hosted Python application that solves this with a web UI, a massive notification ecosystem, and support for everything from simple text changes to complex JavaScript-rendered pages behind login walls. With 30.7k stars, 203 releases, and active development, it's the most popular open-source website change monitoring tool available.

// Key Capabilities

👁️
Visual Selector
Point-and-click tool to select exactly which parts of a page to monitor. No need to write CSS selectors or XPath manually.
🤖
Browser Steps
Automate interactions before monitoring: login to sites, click buttons, fill forms, accept cookies, navigate search results.
💰
Price & Restock Tracking
Dedicated mode for product pages. Extracts pricing metadata, tracks price history, alerts on drops, back-in-stock notifications.
🔔
80+ Notification Channels
Discord, Slack, Telegram, email, Teams, webhooks, custom APIs, and everything else via the Apprise library. Jinja2 templating for content.
📊
JSON API Monitoring
Monitor API responses with JSONPath or jq filters. Parse embedded JSON in HTML pages. Conditional logic with jq operators.
📄
PDF Change Detection
Monitor text changes in PDF files, plus track filesize and checksum changes for binary-level detection.

// How It Works

Add URL Set check interval Filter (CSS/XPath/JSON) Detect change Notify

You add URLs through a web UI running on port 5000, configure how often to check (from minutes to days), optionally set filters to target specific page elements, and configure notification channels. When a change is detected, you get a diff view showing exactly what changed — by word, line, or character. The tool supports both a fast built-in HTTP fetcher and Chrome/Playwright-based fetching for JavaScript-heavy sites.

For more complex scenarios, Browser Steps let you script interactions before the actual monitoring happens: log into a site, navigate to a specific page, fill in search criteria, accept cookie prompts. After the browser steps execute, the Visual Selector lets you pick which elements to watch. This combination handles the common case of monitoring content that's behind authentication or requires navigation to reach.

// Filtering & Triggers

FeatureDescription
CSS SelectorsTarget specific elements by class, ID, or structure
XPath 1.0 / 2.0Advanced element selection with regex support via LXML
JSONPath / jqFilter and restructure JSON API responses with logic operators
Trigger on TextOnly alert when specific text appears or disappears
Ignore TextExclude volatile content (timestamps, ad blocks) from diffs
Regex FiltersRegular expression matching for extract and trigger rules
Conditional ActionsTrigger only when price is above/below threshold, keyword present/absent
SchedulingTimezone-aware schedules, business hours only, weekday/weekend limits

// Deployment

🐳 Docker One-Liner
docker run -d --restart always -p "127.0.0.1:5000:5000" -v datastore-volume:/datastore --name changedetection.io dgtlmoon/changedetection.io — that's it. Also available via docker compose, pip install, or the hosted SaaS at $8.99/month.

The self-hosted version runs as a single Docker container (or via pip) and stores data in a local volume. For JavaScript-rendered pages, you add a Playwright-based browser container alongside it (included in the docker-compose.yml). The project also supports Raspberry Pi and ARM devices, per-watch proxy configuration, and importing watch lists from Excel files. A Chrome extension lets you add the current page to your monitoring list directly from the browser.

// Use Cases

The project's README lists an extensive set of real-world applications: price drop alerts, restock monitoring, government regulatory updates, job posting tracking, security advisory monitoring, website defacement detection, API response monitoring, RSS feed generation from web changes, PCI compliance monitoring, real estate listing changes, and regulatory compliance (RegTech). The tool is used across industries from network security to aerospace to data journalism.

// Considerations

⚠️ Commercial Licensing
The source code is Apache-2.0 for self-hosting, but there's a separate COMMERCIAL_LICENCE.md that applies if you're reselling the software as part of a commercial arrangement. Review this before integrating into a commercial product.

JavaScript pages need a browser container. The built-in fetcher handles static HTML efficiently, but JavaScript-rendered pages require running a separate Playwright/Chrome container. This increases resource usage and deployment complexity. The SaaS plan includes this out of the box.

Scale considerations. changedetection.io is designed for individual or small-team use. If you're monitoring thousands of URLs at high frequency, you'll need to consider the resource implications — especially with browser-based fetching. There's no built-in distributed architecture for horizontal scaling.

Website terms of service. Automated page monitoring at high frequency can violate some websites' terms of service or trigger rate limiting. The tool includes per-watch proxy support and configurable check intervals, but users should be mindful of the targets they're monitoring.

291 open issues. With 30k+ stars and active usage, there's a substantial backlog of feature requests and bug reports. The project is actively maintained (203 releases, latest March 2026), but the issue count reflects the breadth of use cases people bring to it.

// Bottom Line

changedetection.io fills a need that most people don't realize they have until they need it. The ability to monitor any web page for changes — with visual element selection, browser automation, conditional triggers, and 80+ notification channels — covers an enormous range of practical scenarios. The Docker one-liner deployment and web UI make it accessible to non-technical users, while the XPath/JSONPath/jq filtering, REST API, and proxy configuration serve power users and automation workflows.

At 30.7k stars with 203 releases over active development, it's the clear leader in the self-hosted website monitoring space. Whether you're tracking price drops, monitoring competitor pages, watching for regulatory updates, or building automated workflows triggered by web content changes, changedetection.io is the tool most likely to do what you need out of the box.

]]>
<![CDATA[FreeRDP: The Open-Source RDP Implementation That Powers Linux Remote Desktop]]>https://darkwebinformer.com/freerdp-the-open-source-rdp-implementation-that-powers-linux-remote-desktop/69b842413092aa000185f9e5Mon, 16 Mar 2026 17:49:18 GMT
Tool Spotlight Remote Access Open Source Mar 14, 2026

FreeRDP: The Open-Source RDP Implementation That Powers Linux Remote Desktop

FreeRDP: The Open-Source RDP Implementation That Powers Linux Remote Desktop

A free, Apache-licensed implementation of Microsoft's Remote Desktop Protocol. 15 years of development, 23k+ commits, 419 contributors, and 79 releases. FreeRDP is the RDP library under the hood of Remmina, GNOME Connections, KRDC, and most Linux RDP clients. It's also a standalone client, server, and proxy.

FreeRDP / FreeRDP

FreeRDP is a free remote desktop protocol library and clients

C 87.8% C++ 3.5% CMake 3.1% Obj-C 2.6% ★ 12.9k stars v3.24.0 Apache-2.0 15.3k forks 23,291 commits 419 contributors

Microsoft's Remote Desktop Protocol is the standard for remote access to Windows machines, but Microsoft doesn't provide an official RDP client for Linux, macOS (beyond a basic app), Android, or iOS. That gap has been filled for over 15 years by FreeRDP — an open-source implementation of the full RDP protocol that serves as both a standalone client and a library that other applications build on top of.

If you've ever used Remmina, GNOME Connections, or KRDC to connect to a Windows machine from Linux, you were using FreeRDP under the hood. It's the de facto RDP engine for the non-Windows world, and with 23,291 commits across 419 contributors and 79 releases (latest v3.24.0 in March 2026), it's one of the most actively developed open-source infrastructure projects in the remote desktop space.

// What FreeRDP Provides

📚
libfreerdp (Core Library)
Full RDP protocol implementation as a C library. This is what Remmina, GNOME Connections, KRDC, and other clients link against for their RDP support.
🖥️
Client Implementations
Standalone clients for X11, Wayland (SDL-based), Windows, macOS, iOS, and Android. The SDL3 client is no longer considered experimental as of v3.16.
🔧
Server & Proxy
Shadow server for screen sharing and a proxy server for RDP connection brokering. Enables building custom RDP infrastructure.
⚙️
WinPR (Portable Runtime)
A Windows API compatibility layer that lets FreeRDP's codebase use Windows-style APIs portably across Linux, macOS, and other platforms.

// Protocol Features

FreeRDP implements the RDP protocol comprehensively, including the virtual channel system that handles most of the features users care about in a remote desktop session:

FeatureDescription
ClipboardBidirectional text, image, and file transfer between local and remote
AudioSound redirection from remote to local, plus microphone input
Drive RedirectionMount local drives on the remote machine for file access
Printer RedirectionUse local printers from the remote session
Smart CardSmart card authentication passthrough
Multi-MonitorSpan sessions across multiple displays
Graphics CodecsRemoteFX, GFX pipeline, H.264/AVC, progressive rendering
GatewayRD Gateway and TS Gateway support for NAT traversal
NLA / TLSNetwork Level Authentication and TLS encryption
Serial / ParallelLegacy port redirection (yes, still maintained)

// Architecture

Client (X11/SDL/Mac/iOS/Android) libfreerdp Transport (TCP/TLS/Gateway) RDP Server

The architecture separates the protocol implementation (libfreerdp) from the client frontends and server implementations. This is what makes FreeRDP useful both as a standalone tool and as a library. The core handles the RDP state machine, PDU processing, virtual channel management, graphics decoding, and security negotiation. Client implementations then just need to handle platform-specific rendering and input.

The codebase is primarily C (87.8%) with C++ for some components, Objective-C for macOS/iOS clients, and Java for the Android client. The build system uses CMake with extensive CI across platforms including ARM, PowerPC, RISC-V, FreeBSD, macOS, and MinGW cross-compilation.

// Platform Support

PlatformClientNotes
Linux (X11)xfreerdpMost mature client, full feature support
Linux (Wayland)sdl-freerdpSDL3-based, no longer experimental as of v3.16
WindowswfreerdpNative Windows client
macOSMac clientObjective-C based
iOSiOS clientMobile client
AndroidAndroid clientJava-based, builds updated in v3.13

// The Ecosystem Role

🔗 The RDP Engine for Open Source
FreeRDP isn't just a client — it's the RDP library that most open-source remote desktop tools depend on. Remmina, GNOME Connections, KRDC, Apache Guacamole, and numerous other projects use libfreerdp for their RDP implementation. When these tools support the latest RDP protocol features, it's because FreeRDP implemented them first.

This ecosystem role makes FreeRDP's 15.3k forks less surprising — many of those are downstream projects and Linux distribution maintainers. The 374 watchers reflect infrastructure teams and downstream maintainers tracking the project. With Microsoft's Open Specifications providing the protocol documentation, FreeRDP serves as the open-source bridge that keeps RDP interoperable across platforms.

// Considerations

⚠️ Security Surface
As an RDP implementation, FreeRDP processes complex binary protocol data from potentially untrusted sources. The project has had 134 security advisories over its lifetime. The team maintains an active security policy and responds to vulnerabilities, but users should keep FreeRDP updated — especially on internet-facing deployments.

Configuration complexity. FreeRDP is powerful but not simple. The xfreerdp command-line interface has hundreds of flags and options. Getting the right combination of settings for a specific server configuration (NLA, gateway, graphics mode, redirection) often requires consulting documentation. GUI wrappers like Remmina exist specifically to address this.

Wayland maturity. While the SDL3-based Wayland client graduated from experimental status in v3.16, the X11 client remains significantly more battle-tested. Users on Wayland-only setups may encounter edge cases that don't exist on X11.

Documentation gaps. Despite the project's maturity, documentation can be sparse or outdated for some features. The wiki is the primary resource, supplemented by the API documentation and a FAQ. For advanced use cases, reading the source or asking in the Matrix room is often necessary.

Build complexity. Compiling FreeRDP from source involves a substantial dependency tree (OpenSSL, FFmpeg for H.264, PulseAudio/PipeWire for audio, various X11/Wayland libraries). Most Linux distributions package FreeRDP, but those packages may lag behind the latest release.

// Bottom Line

FreeRDP is one of those foundational open-source projects that quietly powers a massive amount of infrastructure. If you connect to a Windows machine from Linux, there's a very high chance FreeRDP is involved. With 23,291 commits, 419 contributors, and 79 releases over 15 years, it's among the most actively maintained protocol implementations in the open-source ecosystem.

The latest v3.24.0 release (March 2026) continues active development with C23 support, improved SDL3 client, and ongoing protocol feature parity. For sysadmins managing Windows infrastructure from Linux, developers building remote desktop tooling, or anyone who needs cross-platform RDP access, FreeRDP is the project that makes it possible.

]]>
<![CDATA[FBI Watchdog Feed]]>https://darkwebinformer.com/fbi-watchdog-feed/69b8285d3092aa000185f9abMon, 16 Mar 2026 15:58:10 GMT<![CDATA[Alleged Breach of Therapeutes Exposes 71,500 Patient Records and 199,000 Therapy Appointments From French Mental Health Platform]]>https://darkwebinformer.com/alleged-breach-of-therapeutes-exposes-71-500-patient-records-and-199-000-therapy-appointments-from-french-mental-health-platform/69b4383ca75cf60001cd0f0cFri, 13 Mar 2026 16:21:43 GMT
Dark Web Informer - Cyber Threat Intelligence

Alleged Breach of Therapeutes.com Exposes 71,500 Patient Records and 199,000 Therapy Appointments From French Mental Health Platform

March 13, 2026 - 9:29:28 AM UTC
France
Healthcare / Mental Health
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-13 09:29:28 UTC
Threat Actor HexDex
Victim Therapeutes.com
Industry Healthcare / Mental Health
Category Data Breach
Alleged Records 71,502 Patients
Appointments 199,697
Unique Emails 95,985
Unique Phones 97,518
Price Make Offer
Network Open Web
Country France

Incident Overview

Alleged Breach of Therapeutes Exposes 71,500 Patient Records and 199,000 Therapy Appointments From French Mental Health Platform

A threat actor going by HexDex claims to be selling sensitive data from Therapeutes.com, a French online platform that has been connecting users with licensed therapists and mental health professionals since 2013. The platform allows people to find, book, and attend therapy sessions either in person or through video calls, meaning the underlying database contains deeply personal information about individuals seeking mental health support.


What makes this breach particularly concerning is the nature of the data involved. This isn't just emails and phone numbers, the listing explicitly mentions therapy appointment records with consultation and reason fields, which would reveal why individuals sought therapy in the first place. The actor provided the following breakdown:

  • Patient Records - 71,502 patients with associated personal information.
  • Appointment Data - 199,697 appointments total, including 56,225 entries with a "consultation" field and 23,492 entries with a "reason" field describing the purpose of the therapy visit.
  • Contact Data - 95,985 unique email addresses and 97,518 unique phone numbers.
  • Government Emails - 27 gouv.fr email addresses were identified in the dataset, indicating some French government employees are among those affected.
  • Samples - The actor provided proof links and a 500-line sample to demonstrate the data's authenticity.

The actor is accepting offers rather than listing a fixed price, and recommends using escrow for secured transactions. Given that this involves healthcare data protected under the EU's GDPR and potentially France's additional health data regulations, the exposure of therapy reasons and consultation details represents a severe privacy risk for affected individuals.

Compromised Data Categories

Patient Records Therapy Appointment Details Consultation Fields Therapy Reason / Purpose Email Addresses Phone Numbers Government Employee Emails (gouv.fr)

Image Preview

Alleged Breach of Therapeutes Exposes 71,500 Patient Records and 199,000 Therapy Appointments From French Mental Health Platform

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
]]>
<![CDATA[Threat Actor Selling Alleged Databases From Crypto, AI, and Finance Platforms Including MagicSlides, TLDR.Tech, and 365.loans]]>https://darkwebinformer.com/threat-actor-selling-alleged-databases-from-crypto-ai-and-finance-platforms-including-magicslides-tldr-tech-and-365-loans/69b43071a75cf60001cd0ecfFri, 13 Mar 2026 15:47:43 GMT
Dark Web Informer - Cyber Threat Intelligence

Threat Actor Selling Alleged Databases From Crypto, AI, and Finance Platforms Including MagicSlides, TLDR.Tech, and 365.loans

March 13, 2026 - 4:28:44 AM UTC
N/A
Cryptocurrency / AI / Finance
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-13 04:28:44 UTC
Threat Actor Sythe
Victims Multiple Platforms
Industry Crypto / AI / Finance
Category Database Sale
Alleged Records ~3.8 Million Emails
Databases Listed 7
Price Contact Seller
Network Open Web
Samples Available via Channel/PM

Incident Overview

Threat Actor Selling Alleged Databases From Crypto, AI, and Finance Platforms Including MagicSlides, TLDR.Tech, and 365.loans

A threat actor going by Sythe is advertising the sale of multiple alleged databases spanning cryptocurrency, artificial intelligence, and finance platforms. The actor claims their group has been collecting private data across these sectors and is offering individual databases for purchase, with samples available through their channel or direct messages.


The listing breaks down into three categories with the following databases:

  • Crypto - BTC.Allo.xyz (91K unique emails), Metaxseed.io (5K unique emails), and YesNoError.com Crypto/AI Database (100K unique emails).
  • Finance - 365.loans (26K emails) and an unnamed 71K-user ecommerce website.
  • AI - MagicSlides.App (2.3 million emails), TLDR.Tech (1.2 million emails), and YesNoError.com Crypto/AI Database (100K unique emails).

The two largest databases by far are MagicSlides.App and TLDR.Tech, which are both AI-focused platforms - MagicSlides is a presentation generation tool and TLDR.Tech is a popular technology newsletter. Combined, those two alone account for roughly 3.5 million of the approximately 3.8 million total email addresses being offered. The actor notes that YesNoError.com appears in both the crypto and AI categories, suggesting it straddles both spaces. No pricing was listed publicly; interested buyers are directed to contact the seller directly.

Compromised Data Categories

Email Addresses User Account Data Cryptocurrency Platform Records Financial Service Records AI Platform User Data Ecommerce User Records

Image Preview

Threat Actor Selling Alleged Databases From Crypto, AI, and Finance Platforms Including MagicSlides, TLDR.Tech, and 365.loans

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
]]>
<![CDATA[Alleged Data Leak Exposes 30 Million Colombian Citizens From ICFES National Education Database]]>https://darkwebinformer.com/alleged-data-leak-exposes-30-million-colombian-citizens-from-icfes-national-education-database/69b424f4a75cf60001cd0e6cFri, 13 Mar 2026 14:58:50 GMT
Dark Web Informer - Cyber Threat Intelligence

Alleged Data Leak Exposes 30 Million Colombian Citizens From ICFES National Education Database

March 13, 2026 - 3:48:06 AM UTC
Colombia
Education / Government
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-13 03:48:06 UTC
Threat Actor CryptoDead
Victim ICFES (Colombia)
Industry Education / Government
Category Data Leak
Alleged Records 30+ Million
Data Size ~100 GB
Motivation Hacktivism / Political
Network Open Web
Price Free (Public Leak)

Incident Overview

Alleged Data Leak Exposes 30 Million Colombian Citizens From ICFES National Education Database

A threat actor operating under the alias CryptoDead has allegedly leaked approximately 100GB of data from ICFES (Instituto Colombiano para la Evaluación de la Educación), Colombia's national education testing institute responsible for administering standardized exams like the Saber tests to millions of students across the country.


The actor framed the leak as a politically motivated act of protest, citing frustration with Colombia's healthcare system and calling on Colombian citizens to demand accountability from their government. The post claims the dataset contains personal information on more than 30 million Colombians. Key details from the listing include:

  • Data Volume - Approximately 100GB of compressed data distributed as a .tar.zst archive, requiring the zstd decompression tool to extract.
  • Alleged Scope - The actor claims the leak covers more than 30 million Colombian citizens, which would represent a significant portion of the country's population.
  • Motivation - The leak was explicitly framed as hacktivism, with the actor stating dissatisfaction with the Colombian healthcare system and government leadership as the driving reason.
  • Distribution - The data was posted freely with a direct download link, not offered for sale, making it immediately accessible to anyone.

ICFES manages education evaluation data for the entire Colombian population that participates in standardized testing, meaning the database likely contains sensitive personal identification details, academic records, and potentially contact information spanning years of test administration. If verified, this would be one of the largest data exposures affecting Colombian citizens.

Compromised Data Categories

Personal Identification Information Education & Academic Records Test Scores & Exam Data Contact Information Demographic Data

Image Preview

Alleged Data Leak Exposes 30 Million Colombian Citizens From ICFES National Education Database Alleged Data Leak Exposes 30 Million Colombian Citizens From ICFES National Education Database

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
]]>
<![CDATA[Daily Dose of Dark Web Informer - March 12th, 2026]]>https://darkwebinformer.com/daily-dose-of-dark-web-informer-march-12th-2026/69b33dd8a75cf60001ccf84bThu, 12 Mar 2026 22:34:19 GMT Dark Web Informer — Daily Threat Intelligence Digest

Daily Threat Intelligence Digest

⚡ Real-Time Monitoring
🔑
API Access Available
Daily Dose of Dark Web Informer - March 12th, 2026

High-volume threat intelligence, ransomware data, IOC exports, and comprehensive feed access for security teams and researchers.

Explore API →
🔁 Follow across all official platforms — darkwebinformer.com/socials
🔥
Advertising Opportunities

Reach a highly engaged audience of 35,800+ unique users monthly and growing. View details

35.8k
Unique Visitors
89.3k
Pageviews

Last 30 days as of Mar 2, 2026. Next update Mar 31st.

🔒

Unlock Premium Intelligence

Real-time breach tracking, expert analysis, high-resolution evidence, unredacted feeds, and 5,100+ blog posts. View all plans and features on the pricing page.

View Plans & Subscribe →
💚

Support Dark Web Informer

Contributions help continue monitoring threats and keeping the community informed.

🟠
MoneroXMR
89Z68A33B9sNRf941f5GczU4ZzarTQsWn6dyMVUbo6mk2zYEamh9hALH1odMiVZfynKhjKPS58ASAfDyFdTW9o29Mwf4ArZ Copied
🟡
BitcoinBTC
bc1qvs4pfwascp2uln90g3e3l4agnhnjrdn2t578we Copied
🔷
EthereumETH / ERC-20 / USDT
0xbA6bCf2BF50F9789504401AFbf19E8c2CCaa773D Copied

Click address to copy · ETH address accepts USDT, USDC, and other ERC-20 tokens

📌 Legend

📰Law Enforcement — LEA updates, investigations
⚠️Dark Web Notices — forums, markets, announcements
❗️Urgent Threats — breaches, ransomware, vulnerabilities
💡Insights & Tools — guides, OSINT, learning resources
🔒Subscribers OnlyX/Twitter subscribe

🧾 Today's Intelligence

X/Twitter Updates
]]>
<![CDATA[Sage: Avast's Agent Detection & Response Layer That Guards AI Coding Agents Against Malicious Commands]]>https://darkwebinformer.com/sage-avasts-agent-detection-response-layer-that-guards-ai-coding-agents-against-malicious-commands/69b3157aa75cf60001ccf764Thu, 12 Mar 2026 19:39:10 GMT
Tool Spotlight AI Security Open Source Mar 12, 2026

Sage: Avast's Agent Detection & Response Layer That Guards AI Coding Agents Against Malicious Commands

Sage: Avast's Agent Detection & Response Layer That Guards AI Coding Agents Against Malicious Commands

A lightweight security layer from Gen Digital (Avast/Norton) that intercepts tool calls from Claude Code, Cursor, and OpenClaw — checking URLs against reputation APIs, scanning packages for supply-chain threats, and matching commands against YAML-based threat definitions. Think antivirus, but for AI agents.

avast / sage

Lightweight Agent Detection & Response (ADR) layer for AI agents — guards commands, files, and web requests

TypeScript 89.5% JavaScript 10.1% ★ 127 stars v0.4.3 Apache-2.0 5 forks 81 commits 6 contributors

AI coding agents now run shell commands, write files, fetch URLs, and install packages on your behalf. Claude Code, Cursor, and OpenClaw all give agents broad access to your development environment. But what happens when a prompt injection tricks an agent into running curl against a malicious URL, or installing a typosquatted npm package, or writing a backdoor into your codebase? The agent follows instructions — it doesn't inherently know the difference between a legitimate command and a malicious one.

Sage is Gen Digital's (the parent company of Avast and Norton) answer to this problem. It's an Agent Detection & Response (ADR) layer that sits between the AI agent and the system, intercepting tool calls before they execute. It's a new category of security tooling — not protecting against AI threats, but protecting AI agents from being exploited as attack vectors.

// Detection Layers

🌐
URL Reputation
Cloud-based checks against Gen Digital's reputation APIs for malware, phishing, and scam detection. Sends URL hashes, not full URLs.
📋
Local Heuristics
YAML-based threat definitions that match dangerous command patterns, file paths, and behaviors locally. No cloud calls needed.
📦
Package Supply-Chain
Checks npm and PyPI packages against registry existence, file reputation, and age analysis to catch typosquatting and malicious dependencies.
🔌
Plugin Scanning
Scans other installed plugins for threats at session start. Catches malicious extensions that could compromise the agent environment.

// How It Works

Agent issues tool call Sage hook intercepts Check URL / command / package Verdict: allow / warn / block

Sage hooks into the tool call pipeline of each supported platform. In Claude Code, it registers as a plugin that intercepts Bash commands, URL fetches, and file writes. In Cursor/VS Code, it runs as an extension. In OpenClaw, it installs as a plugin package. When a tool call comes through, Sage evaluates it against all four detection layers and returns a verdict: allow, warn, or block.

The threat definitions are YAML-based rules stored in the threats/ directory. These define patterns for dangerous operations — things like attempts to exfiltrate environment variables, write to sensitive system paths, download from known-bad domains, or install packages with suspicious naming patterns. The rules are versioned alongside the code and carry their own license (Detection Rule License 1.1).

// Platform Support

PlatformInstallationIntegration Method
Claude CodePlugin marketplacePlugin hook system
Cursor / VS CodeVSIX extensionExtension API + command palette
OpenClawnpm package or sourcePlugin system

Claude Code installation is the simplest: two commands via the plugin marketplace. Cursor requires building the VSIX from source with pnpm and then enabling protection from the command palette. OpenClaw supports installation from npm directly or from source. All three platforms use the same core detection engine under the hood.

// Privacy Model

🔒 What Stays Local, What Gets Sent
Sage sends URL hashes and package hashes to Gen Digital's reputation APIs for cloud-based checking. File content, commands, and source code never leave the machine. Both cloud services can be disabled for fully offline operation using local heuristics only.

The privacy model is well-documented and transparent. The cloud components send hashes, not raw data, to Gen Digital's reputation infrastructure. For security-sensitive environments that can't tolerate any external communication, the cloud checks can be disabled entirely, falling back to local YAML-based threat definitions only. This is a reasonable trade-off — cloud reputation databases are significantly more comprehensive, but the local-only mode still provides meaningful protection.

// Who Built This

This comes from Gen Digital, the parent company of Avast, Norton, LifeLock, and AVG. That's significant context — this isn't a side project from a random developer. It's a security company with decades of experience in threat detection and reputation systems applying that expertise to a new attack surface: AI coding agents. The URL reputation and package reputation APIs that Sage calls into are backed by Gen Digital's existing threat intelligence infrastructure.

// Considerations

⚠️ Early Stage
Sage is at v0.4.3 with 81 commits. MCP tool call interception is not yet implemented, and custom user threat definitions are not yet supported. This is pre-1.0 software from a major security vendor — expect rapid iteration.

No MCP interception yet. The most significant current limitation. MCP (Model Context Protocol) tool calls (mcp__*) are not yet intercepted, meaning Sage can't guard against malicious operations routed through MCP servers. Given that MCP is becoming the standard integration layer for AI agents, this is a gap that needs closing.

Cloud dependency for full protection. The strongest detection layer (URL and package reputation) requires calling Gen Digital's cloud APIs. Fully offline operation is supported but offers reduced coverage. Organizations with strict data egress policies will need to evaluate whether hash-based lookups meet their requirements.

Platform coverage. Currently limited to Claude Code, Cursor/VS Code, and OpenClaw. Other popular agent frameworks (Windsurf, Aider, Continue, etc.) are not yet supported. The monorepo architecture with a shared core engine suggests adding new platforms should be relatively straightforward.

Threat rule licensing. The source code is Apache-2.0, but the threat detection rules in threats/ carry a separate "Detection Rule License 1.1." Users should review this license for any restrictions on use or redistribution of the threat definitions.

// Bottom Line

Sage represents a new and increasingly necessary category of security tooling. As AI coding agents gain deeper access to development environments — running shell commands, installing packages, writing files — the attack surface expands significantly. Prompt injection, typosquatted packages, and malicious URLs are real threats that agents are poorly equipped to defend against on their own.

Having a major security vendor like Gen Digital invest in this space adds credibility and brings real threat intelligence infrastructure to the problem. The four-layer detection approach (URL reputation, local heuristics, supply-chain checks, plugin scanning) covers the most important attack vectors, and the privacy model is transparent about what data leaves the machine. At 127 stars it's still early, but the backing, the architecture, and the problem it solves make Sage worth watching — and worth installing if you're running AI coding agents in any serious capacity.

]]>