Breach Group intelligence
๐ ๐ฎ๐ฑ๐๐ฎ๐ฝ โ ๏ธ_/ยฐโข๐ต๐ธ
InactiveTrack ๐ ๐ฎ๐ฑ๐๐ฎ๐ฝ โ ๏ธ_/ยฐโข๐ต๐ธ with 53 published victims in a single intelligence view.
Overview
๐ ๐ฎ๐ฑ๐๐ฎ๐ฝ โ ๏ธ_/ยฐโข๐ต๐ธ is tracked by Breach House as a breach group with 53 published victims.
Israel is currently the most targeted country in this dataset.
No leak location metadata is currently available for this group.
Top Countries
Interactive distribution based on the currently visible victims list.
Known Leak Locations (0)
No known leak locations available for this group.
Top Activity Sectors
No sector intelligence available.
Ransom Notes (0)
โผNo ransom notes available for this group.
Tools Used
โผNo tools used available.
YARA Rules (0)
โผNo YARA rules available.
Indicators of Compromise (0)
โผNo IoCs available for this group.
Negotiation Chats (0)
โผNo negotiation chats available.
Research Sources
No external research sources linked yet.
Victims (53)
Search, filter and paginate the victim timeline for ๐ ๐ฎ๐ฑ๐๐ฎ๐ฝ โ ๏ธ_/ยฐโข๐ต๐ธ.
| Type | Target | Discovered | Country | Business Category | Intel Link |
|---|---|---|---|---|---|
| Breach | DB_error_dorks.txt id0017cb25e632 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | api_dork.txt id964b8da5cd74 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | URI_ICS_FUZZ.txt id540bb92261df View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | xss-script-tags-html-element-injection-sample.txt id4224d1d55580 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | well-known-parameter-names-brute-force.txt id967ba170b29c View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | uri-fuzzing-list.txt id85c3d2683fb5 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | AEC_ICS_IOT_Shodan_dorks.txt id1b6afe182e42 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | xss-starter.txt id404a3ef9dc9a View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | UK_Military_Staff.csv idc05012b51b3b View details | โ | |||
|
#OpIsrael |
|||||
| Breach | grid.xlsx idc8049129bda1 View details | โ | |||
|
Israel Grid Location #OpIsrael |
|||||
| Breach | EL183286.txt ide5ce5eb0861f View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | EL183301.txt idfaeff669a0f0 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | EL183764.txt iddb8ea3db0fd3 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | EL183272.txt id601ec84775cf View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | EL183391.txt ide3d3a027808f View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | ELS300805.txt id5cb0b742b539 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | Pre Seed_2023.csv id23e72ed2e643 View details | โ | |||
|
"Invesment Year","Company Stage ","Supplementary funding ","Technological Classification","Company Name",Website," Contact name","Contact Person: Mobile","Contact Person: Email","Company's description","Last invested program" Israeli Start-up Investment 2023 #OpIsrael |
|||||
| Breach | Pre Seed_2024.csv ida8313d8bf1a5 View details | โ | |||
|
"Invesment Year","Company Stage ","Supplementary funding ","Technological Classification","Company Name",Website," Contact name","Contact Person: Mobile","Contact Person: Email","Company's description","Last invested program" Israeli Start-up Investment 2024 #OpIsrael |
|||||
| Breach | cityofsummit_org.csv id37748e8e9655 View details | โ | |||
|
ExportItem Id, Item Identity, Document ID, Selected, Duplicate to Item, Original Path, Location, Location Name, Target Path, Document Path, Sender or Created by, Recipients in To line, Recipients in Cc line, Recipients in Bcc line, To โ Expanded, CC โ Expanded, BCC โ Expanded, DG Expansion Result, Sent, Has Attachments, Importance, Is Read, Modified by, Type, Received or Created, Modified Date, Size (KB) 60,521 lines City of Summit, New Jersey @CaliforniaHacker |
|||||
| Breach | darpa_mil.txt id816e42e03eca View details | โ | |||
|
1545 emails / darpa.mil @CaliforniaHacker |
|||||
| Breach | whs_mil.txt id2ebd2da247d1 View details | โ | |||
|
1408 emails / whs.mil @CaliforniaHacker |
|||||
| Breach | dtic_mil.txt idec3a89fe08be View details | โ | |||
|
437 emails / dtic.mil @CaliforniaHacker |
|||||
| Breach | Lobbyist_Employers_Summary.csv id2574896e99c9 View details | โ | |||
|
id,Year,Employer_Name,Employer_Email,Employer_Phone,Employer_Address,Employer_City,Employer_State,Employer_Zip,Employer_Country,compensation,expenditures,agg_contrib,ballot_prop,entertain,vendor,expert_retain,inform_material,lobbying_comm,ie_in_support,itemized_exp,other_l3_exp,political,corr_compensation,corr_expend,total_exp,l3_nid,employer_nid,url data.wa.gov #OpIsrael #OpUSA |
|||||
| Breach | Naval Air Station.csv id6e8fcc5a60a2 View details | โ | |||
|
opendata.maryland.gov #OpIsrael #OpUSA |
|||||
| Breach | Military-Installations.csv id3d7f4f394b28 View details | โ | |||
|
Service Branch,Installation,Program/Service,Title,Physical Address,Mailing Address,Phone/Fax 1,Phone/Fax 2,Phone/Fax 3,Phone/Fax 4,Phone/Fax 5,Phone/Fax 6,Website,Additional Information,Map home.army.mil #OpIsrael #OpUSA |
|||||
| Breach | CSTART Email Contacts.csv id2d9e1bb9be3d View details | โ | |||
|
First Name,Last Name,Email reginfo.gov #OpIsrael #OpUSA |
|||||
| Breach | website_metrics_gov.csv idbca1928cd0a7 View details | โ | |||
|
Website,Agency,Bureau,HTTP Status Code,Redirect,Redirect URL,HTTPS Enabled,HTTPS Enforced,HSTS Enabled,USWDS Usage,DAP Participation,Accessibility Color Contrast Issues,Accessibility HTML Attribute Issues,Accessibility Missing Image Description Issues,Last Scan Date itdashboard.gov #OpIsrael #OpUSA |
|||||
| Breach | US_Military_Airports.csv id78a51ab91c3c View details | โ | |||
|
X,Y,OBJECTID,Facility,FacWeb,AirportID,City,County,FnctnlClss,ClassCode,StateClass,FacUseType,Ownership,Owner,FAASiteNo,District,Elevation,AirportMas,AltLat,AltLong,Latitude,Longitude,LatDD,LongDD navy.mil #OpIsrael #OpUSA |
|||||
| Breach | Energy_Contractors_NY.csv id448e502c0742 View details | โ | |||
|
Data Current as of Date,Application ID,Primary Contractor Name,Contractor Type,Project Type,Technology 1,Technology 2,Technology 3,Project Title,Contractor Street,Contractor City,Contractor State/Province,Contractor Zip/Postal Code,Contractor Website,Award Date,Award Amount (US Dollars) data.ny.gov #OpIsrael #OpUSA |
|||||
| Breach | County_Internet_Providers.csv id66d7adfcdd45 View details | โ | |||
|
County,Provider,Provider Website,Technology of Transmission,Consumer Service,Maximum Advertised Download Speed (Mbps),Maximum Advertised Upload Speed (Mbps),Business Service,Maximum Contractual Download Speed (Mbps),Maximum Contractual Upload Speed (Mbps) #OpIsrael #OpUSA |
|||||
| Breach | gov_contractors.csv idf68510a69ab1 View details | โ | |||
|
#OpIsrael #OpUSA |
|||||
| Breach | Loan_Military_emp.csv id91ff5871f5b4 View details | โ | |||
|
"dealerid","dealnumber","SoldTime","dealCreatedTime","closedTime","STATUS","type","source","contract_age","quote_age","paymenttype","Terms","amountfinanced","emiamount","downpayment","apr","aprcode","loantovalueratio","daystofirstpayment","totalpayable","totalcapreduced","moneyfactor","yrlymiles_basevalue","yrlymiles_penaltypermile","financecharge","totalgrossamt","backgrossamt","frontgrossamt","vin","stockid","vehicletype","year","make","model","bodyclass","bodytype","enginedescription","exteriorcolor","interiorcolor","trim","fueltype","finalcost","glbalance","invoiceprice","msrp","profit","retailprice","sellingprice","mileage","primarysalespersonnumber","primarysalespersonname","secondarysalespersonnumber","secondarysalespersonname","salesmanagernumber","salesmanagername","fnimanagernumber","fnimanagername","buyer_DisplayNo","buyer_customerType","buyer_firstName","buyer_lastName","buyer_streetAddress1","buyer_streetAddress2","buyer_city","buyer_country","buyer_county","buyer_state","buyer_postalCode","buyer_homePhone","buyer_workPhone","buyer_mobilePhone","buyer_email","Co_buyer_DisplayNo","Co_buyer_customerType","Co_buyer_firstName","Co_buyer_lastName","Co_buyer_streetAddress1","Co_buyer_streetAddress2","Co_buyer_city","Co_buyer_country","Co_buyer_county","Co_buyer_state","Co_buyer_postalCode","Co_buyer_homePhone","Co_buyer_workPhone","Co_buyer_mobilePhone","Co_buyer_email","tradein1_vin","tradein1_acv","tradein1_payoff","tradein1_allowance","tradein2_vin","tradein2_acv","tradein2_payoff","tradein2_allowance" #OpIsrael #OpUSA |
|||||
| Breach | employees_gov.csv id8c37375840f0 View details | โ | |||
|
Name,Email,Role 45,271 GOV & MIL employee #OpIsrael #OpUSA |
|||||
| Breach | USA_targets.txt id44cf26541825 View details | United States | โ | ||
|
GOV & MIL targets 13,481 host + IP #OpIsrael #OpUSA |
|||||
| Breach | IP_list.txt id541286e861e5 View details | โ | |||
|
8,750 unique IP GOV & MIL targets #OpIsrael #OpUSA |
|||||
| Breach | gov.txt id0bffde6c7a50 View details | โ | |||
|
American targets #RuskiNet #OpIsraelTeam #OpUSA #OpIsrael |
|||||
| Breach | military.txt idca96c76f9a1c View details | โ | |||
|
American targets #RuskiNet #OpIsraelTeam #OpUSA #OpIsrael |
|||||
| Breach | US_sub.txt id31e5ba5130c0 View details | โ | |||
|
American targets #RuskiNet #OpIsraelTeam #OpUSA #OpIsrael |
|||||
| Breach | GOV_EG.txt id080b20bb01bb View details | โ | |||
|
#OpEgypt |
|||||
| Breach | GOV_JO.txt id46233bd272c1 View details | โ | |||
|
#OpJordan |
|||||
| Breach | IL_IPv6.txt id2828d892885f View details | โ | |||
|
Israel IP ranges updated #OpIsrael |
|||||
| Breach | IL_IPv4.txt id75d60cba0217 View details | โ | |||
|
Israel IP ranges updated #OpIsrael |
|||||
| Breach | Tamal_DB.txt id7a426826d3c2 View details | โ | |||
|
Data leaked by Key40 Target: tamal.co.il About Tamal company: Since 1983, TAMAL Specialized in payroll software and financial accounting. We provide a range of integrated software solutions to 15,000 companies and businesses from wages and attendance, through taxation and accounting and office management. Our development team relies on years of experience and adjusts to the changing reality. we provide payroll stubs for more than 1,000,000 employees in Israel. #OpIsrael |
|||||
| Breach | elbitsystems_emails.txt id2532ba135386 View details | โ | |||
|
4439 emails from Elbit Systems #OpIsrael |
|||||
| Breach | israhell.rar id77e1f97e7735 View details | โ | |||
|
FREE PALESTINE ๐ต๐ธ PARTIAL REPOST FROM OUR PREVIOUSLY SUSPENDED CHANNEL. A nice breach affecting the main target of aharon.co.il which is a host to a multitude of different services and corps in Israel including the ministry of Defense. size 1.9GB of Data from Aharon and various other critical targets in Israel. Today Israel stormed the AQSA mosque to celebrate the anniversary of their occupation. to this is fucked up would be an understatement but this seems to be a repeating phrase everytime Israel is mentioned, Besides just this critical Breach, we have continued with our standard ICS/OT attacks just because you "hide the ip" or block shodan from scanning doesn't mean you protected your devices. Post coming soon presenting a full demonstration of the attacks done to the various OT devices we found in Israel and damaged. For a Free Palestine, For a Free world. WE MUST STAND UNITED! Chase your dreams, and be the best version of yourself, not just for you but for the world to grow! ~GhostSec ๐ปโค๏ธ |
|||||
| Breach | Tyco_related_domains.txt id9b5dc52d800b View details | โ | |||
|
List of 372 domains related to Tyco with their respective IPs. |
|||||
| Breach | dir_he.txt idee2c21ea832b View details | โ | |||
|
Hebrew wordlist for directory listings. #OpIsrael |
|||||
| Breach | intuview.7z iddb755f5478d6 View details | โ | |||
|
https://www.intuview.com/ The uses of IntuView technology in the fields of Defense, Intelligence and Homeland Security are manifold: Document Exploitation (DOCEX) and Content Forensics of captured digital storage media, Open Source Intelligence (OSINT), Cyber Threat Monitoring, Social Media Monitoring in theatres, Improvised Explosive Device (IED) recipe identification, Social Media monitoring, Name Matching and more. Israel & USA company Fuck Zionists #OpIsrael #FreeGaza |
|||||
| Breach | cashawards.sql id33d79867a700 View details | โ | |||
|
Scheme of Cash Awards to Medal Winners In International Sports Events #OpIndia |
|||||
| Breach | gcabs_payments.txt id7fc09096fe81 View details | โ | |||
|
https://gcabs.co.in/ "username": "nodeuser" "password": "DBUser#231*Pass" "database": "taxidriverduty" #OpIndia |
|||||
| Breach | gcabs_dump2024.sql id2e8d1146de68 View details | โ | |||
|
No additional victim description available. |
|||||
| Breach | contec_backdoor.txt id4b73be6bc5ad View details | โ | |||
|
Here's how to reproduce the Contec backdoor exploit, as seen in the video. #OpIsrael |
|||||
| Breach | OpIsrael_targets.txt id8fa4d8f5ac7c View details | Israel | โ | ||
|
No additional victim description available. |
|||||