Comorando
111 posts

Comorando
@getcomorando
Is your business email on the dark web? Find out in 30 seconds. Free scan — no signup. Real-time breach alerts for SMBs. Lifetime Deal: $97
Protecting SMBs worldwide Katılım Aralık 2025
24 Takip Edilen12 Takipçiler

🚨 28 organismos del Estado argentino hackeados simultáneamente.
Banco Central, Ministerios, Policías, Salud, Educación, Justicia.
El grupo CHRONUSTEAM se adjudicó el ataque más grande en la historia digital de Argentina.
🧵 Qué se sabe hasta ahora ↓ #Argentina

Español

Los ataques a la cadena de suministro se están convirtiendo en el vector principal. El próximo no atacará a Trivy—atacará a la herramienta que usas todos los días.
Mantente alerta.
#Ciberseguridad #SupplyChain
Español

@DarkWebInformer Important flag. If confirmed, this is serious—CURP + full address + phone is identity theft ready.
Curious—has Regio Ruta or INAI (Mexico's data protection authority) commented on this?
English

‼️🇲🇽 A dataset allegedly from Regio Ruta, a public transit platform in Monterrey, Nuevo León, Mexico, has been leaked on a popular cybercrime forum.
▪️ Records: 117,570
▪️ Data Fields: RUC, ID, full name, CURP, date of birth, phone, email, full address, city, postal code, status
▪️ Format: .csv

English

@DarkWebInformer Great share. 211K phone numbers + names is perfect for smishing—attackers can text 'Your loyalty points expire' and people will click.
Curious—has Les Burgers de Papa issued any official statement yet
English

‼️🇫🇷 A dataset allegedly from lesburgersdepapa.fr, a French burger restaurant chain, has been leaked on a popular cybercrime forum.
▪️ Lines: 242,705
▪️ Unique Emails: 132,246
▪️ Phone Numbers: 211,481


English

@VECERTRadar Important alert. Without the association's name, it's hard to verify—but the real risk is supply chain exposure for 1,000+ member companies.
Curious—anyone seen confirmation of which association this is?
English

Critical Access - Business Association in Spain 🇪🇸🏢
Analyzer has detected an infrastructure compromise offer targeting a Spanish business association that represents over 1,000 companies in the same sector. The actor laguna_b has offered for sale full control over the web application and the members' database.
Victim: Business Association (Spain) 🏛️
Threat Actor: laguna_b 🎭
Geolocation: Spain (ES) 🇪🇸
Date: March 30, 2026 🗓️
🛠️ Technical Compromise Details
The actor is offering a level of access that compromises the supply chain and the trust of the association's members:
Webroot Access: Control at the root directory level of the web server (not the entire system), with read and write permissions to edit PHP files.
Administrative Privileges: Includes the email administrator password and full access to the MySQL database.
Data Exfiltration: The attacker claims to have already dumped the database member table.
Monitor:
analyzer.vecert.io
#CyberSecurity #Spain #SupplyChainAttack #DataBreach #MySQL #WebShell #BusinessAssociation #InfoSec #CyberAlert #HackingNews #PrivacyRisk #CybersecuritySpain

English

