Data Leak Surge Targets Government, Telecom, and Healthcare Globally

Events tracked
159
Critical exposure
48

Summary

Today's threat landscape is defined by a broad, opportunistic assault on government and critical infrastructure, with a significant spike in data breach and leak events. While ransomware remains a persistent concern, the volume of alleged data exposures -- particularly targeting healthcare, telecommunications, and government entities across India, the US, and Indonesia -- signals a shift toward data extortion and credential harvesting as primary objectives. Defenders should also note the escalating risk from software supply chain attacks, as newly published exploit code and malicious packages are rapidly weaponized by threat actors.

Today's developments

The most concentrated activity today comes from the actor The BlackH4t MD-Ghost, who claims responsibility for multiple high-impact leaks. Alleged incidents include a breach of Israel's Ministry of Construction and Housing, a leak of Swedish passport records, a database of Israeli phone numbers, and a broader sale of 50,000 passport records allegedly linked to high-profile individuals across Israel, the United States, France, Canada, Jordan, Egypt, Saudi Arabia, and Sweden. These claims, if verified, represent a significant intelligence-gathering operation targeting government-issued identity documents.

Several critical infrastructure and financial services entities are also in the crosshairs. An actor known as RubiconH4CK alleges a data breach at Telekom Serbia, a major telecommunications provider. In the financial sector, Exchange Markets claims to have breached the Abu Dhabi Investment Office, while giorggios alleges access to customer registration data from Tiger Brokers Singapore and Deutsche Telekom. The healthcare sector is heavily targeted: kalabaz claims to be selling a database from VIP Universal Medical Insurance Group Inc in the US, and S-Root alleges breaches at Aman Hospital in both Jordan and Qatar.

Indonesia remains a primary victim, with multiple alleged breaches targeting government and law enforcement agencies. JAX7 claims to have breached the Komisi Pemberantasan Korupsi (Corruption Eradication Commission), and mosad alleges a data sale from the Tentara Nasional Indonesia (Indonesian military). Other actors, including BROTHERHOOD CAPUNG INDONESIA, claim leaks from educational institutions and civil records. This pattern suggests a coordinated or opportunistic campaign against Indonesian public-sector digital infrastructure.

Industry reporting today reinforces the severity of the supply chain threat. Security researchers have identified four new malicious npm packages delivering infostealers and DDoS malware, with one being a clone of the recently open-sourced Shai-Hulud worm. Separately, a proof-of-concept exploit for a Windows zero-day privilege escalation flaw, dubbed MiniPlasma, has been released, targeting the Cloud Files Mini Filter Driver on fully patched systems. The 7-Eleven data breach, confirmed after a ransom demand from ShinyHunters, underscores the ongoing risk to retail and customer data. Analysts also warn that the Canvas breach serves as a blueprint for how SaaS attacks now work, moving beyond simple perimeter defense.

Threat landscape signals

The event data reveals a clear clustering of activity around government administration and healthcare verticals, with India, the US, and Indonesia absorbing the highest number of incidents. The actor Neffex THe BlackHat is responsible for 34 events, though the nature of these events (likely defacements or low-complexity attacks) suggests a volume-over-precision approach. In contrast, Qilin (6 events) and NoName057(16) (13 events) represent more targeted, capability-driven threats -- Qilin in ransomware and NoName057(16) in DDoS operations.

A notable shift is the prevalence of data breach and leak events (48 total) over ransomware (23), indicating that threat actors are increasingly prioritizing data exfiltration for extortion or sale rather than encryption-based attacks. The rise of combo lists and access sales (e.g., FTP credentials) further points to a mature cybercriminal economy where initial access is commoditized. Defenders should prioritize identity and access management, monitor for supply chain compromises in development pipelines, and assume that perimeter defenses alone are insufficient against today's data-driven threat landscape.

All incidents are reported as alleged claims by threat actors and have not been independently verified by GrayscaleInsight.

Threat intelligence is reported for security awareness purposes only and does not constitute endorsement of any actor, group, or activity.

Recent editions