Ransomware Attack Update - January 8th, 2026
🚨Free downloads to "Next gen Malware" that-one-website[.]com/Thread-COLLECTION-Next-Gen-Malware image
🚨 ComedyWorks.com Data Breach: 200,000+ User Records Exposed 📌 United States 🇺🇸 ▪️Industry: Entertainment / Ticketing ▪️Type: Data Leak ▪️Threat Actor: lulzintel ComedyWorks.com reportedly suffered a data breach in January 2026, with the leak now posted on a dark-web forum. Actor shared two databases containing customer and order information. Exposed Data Includes: ▪️Full names ▪️Email addresses ▪️Password hashes ▪️Billing address ▪️Phone numbers ▪️Credit card last four & card type ▪️Expiry date ▪️Payment methods ▪️Order details image
Evolution and Gunra Ransomware Notes have been added.
OneURL: An open-source alternative to Linktree. Create a profile page to share all your important links in one place GitHub: image
🚨 Threat actor leaks user database from crypto-related Italian domain lit.it. 📌 Italy 🇮🇹 Industry: Crypto / Finance Type: User Database Leak Threat Actor: Wadjet A database associated with lit.it, a crypto-related service, has been posted on a dark-web forum. The actor states the dump is not their own leak, and the breach date is unknown. Leak Details: ▪️ Domain: lit.it ▪️ Status: Third-party leak repost (date unknown) ▪️ Total Records: 309,667 lines ▪️ Format: PHP-style structured export Sample Fields: ▪️ID ▪️Username ▪️First Name ▪️Last Name ▪️Email image
🚨 Threat actor auctions full root access to a TV live-streaming platform with over 30,000 users. 📌 Unknown ▪️Industry: Streaming / IPTV ▪️Type: Server Compromise – Root Access for Sale ▪️Threat Actor: Mr.Wizard A dark-web actor is offering server-level root access to a TV live-streaming website reportedly serving 30,000+ active users, primarily through an APK-based mobile application. Offer Details: ▪️Access Level: Full Server Root Access ▪️User Base: 30k+ streaming users ▪️Start: $1,000 ▪️Bid Increment: $100 ▪️Buy: $3,000 image
ProfileHound: A post-escalation tool to help find and achieve red-teaming objectives by locating domain user profiles on machines GitHub: