[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @H4ckmanac Hackmanac Hackmanac posts on X about status, japan, $3774t, bank the most. They currently have XXXXXXX followers and XX posts still getting attention that total XXXXXX engagements in the last XX hours. ### Engagements: XXXXXX [#](/creator/twitter::190389182/interactions)  - X Week XXXXXXX -XX% - X Month XXXXXXXXX -XX% - X Months XXXXXXXXXX +158% - X Year XXXXXXXXXX -XXXX% ### Mentions: XX [#](/creator/twitter::190389182/posts_active)  - X Week XX -XX% - X Month XXX -XX% - X Months XXX +66% - X Year XXX +6.60% ### Followers: XXXXXXX [#](/creator/twitter::190389182/followers)  - X Week XXXXXXX +0.19% - X Month XXXXXXX +3.20% - X Months XXXXXXX +27% - X Year XXXXXXX +59% ### CreatorRank: XXXXXXX [#](/creator/twitter::190389182/influencer_rank)  ### Social Influence **Social category influence** [countries](/list/countries) XXXXX% [technology brands](/list/technology-brands) XXXXX% [stocks](/list/stocks) XXXXX% [finance](/list/finance) XXXX% [exchanges](/list/exchanges) #937 [travel destinations](/list/travel-destinations) XXXX% [automotive brands](/list/automotive-brands) XXXX% [cryptocurrencies](/list/cryptocurrencies) XXXX% [currencies](/list/currencies) XXXX% [gaming](/list/gaming) XXXX% **Social topic influence** [status](/topic/status) #3063, [japan](/topic/japan) #2292, [$3774t](/topic/$3774t) #1, [bank](/topic/bank) #2384, [saudi arabia](/topic/saudi-arabia) #1080, [accounting](/topic/accounting) #58, [countries](/topic/countries) #1093, [oracle](/topic/oracle) 4.55%, [spain](/topic/spain) #1232, [france](/topic/france) XXXX% **Top accounts mentioned or mentioned by** [@cybooto](/creator/undefined) [@fakeemail683123](/creator/undefined) **Top assets mentioned** [Coinbase Global, Inc. (COIN)](/topic/coinbase) [Mizuho Financial Group, Inc. (MFG)](/topic/mizuho-financial) [Solana (SOL)](/topic/solana) [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) ### Top Social Posts Top posts by engagements in the last XX hours "🚨 🚨 🧠 : Free access to dashboards timely alerts attack trends threat actor insights affected regions and severity metrics powered by our proprietary ESIX (Estimated Severity Index). 🌐 : 📌 LinkedIn 📌 Telegram Channel 📌 Community Chat 📌 Bluesky 📥 : 50+ pages 8000+ confirmed attacks analysed top trends targeted industries threat actors and global impact breakdowns. 📅 : 🔍 #HackTuesday confirmed attacks victims threat actors and attack methods 📉 #RiskFriday weekly impact snapshot by industry country and threat actor powered by ESIX 🎯 : We empower CISOs security managers" [X Link](https://x.com/H4ckmanac/status/1993566571856277831) 2025-11-26T06:24Z 103.4K followers, 28.1K engagements "🚨Cyber Alert Indonesia - Bank Mandiri BreachLaboratory threat actor claims to have breached Bank Mandiri. Allegedly the attackers leaked more than 18000 financial records including personal details SWIFT code BMRIIDJA account setup data balances fees and debit card usage information. Sector: Financial Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web" [X Link](https://x.com/H4ckmanac/status/1994090512463351862) 2025-11-27T17:06Z 103.4K followers, 16.6K engagements "🚨Cyber Alert Spain - In the past XX hours the hacktivist group NoName057(16) claims to have carried out an intensive DDoS campaign against Spanish infrastructure listing XX new targets and bringing the total to at least XX since November XX. - CACESA - S2GRUPO - Autoridad Portuaria de Cartagena - Ports of Las Palmas - Canal de Isabel II - Mumken - Ayuntamiento de Toledo - Concello de Santiago de Compostela - Cmara de Comercio e Industria de Madrid - Diputacin de Lleida - Metro Bilbao S.A. - Innovasur - Ayuntamiento de Bilbao - Ciberso - Axians Spain - AuthUSB - Advens - Jtsec Beyond IT" [X Link](https://x.com/H4ckmanac/status/1994321864093774141) 2025-11-28T08:25Z 103.4K followers, 56.4K engagements "🟧 #HackTuesday 🟧 Hack Tuesday: Week XX Nov - XX Dec 2025 ⚠378 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was NoName057(16) claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for XXXX% of incidents with XXX cyber attacks. ➡The Gov / Mil / LE sector is the most targeted accounting for XXXX% of incidents with XX cyber attacks. ➡The estimated Critical cyber attacks account to XX (10.4% of the total). ➡Overall the claimed compromised data amounts to approximately XX TB. More details:" [X Link](https://x.com/H4ckmanac/status/1996161214943228380) 2025-12-03T10:14Z 103.4K followers, 9816 engagements "🚨Cyber Alert France - Leroy Merlin Leroy Merlin reports that it has suffered a cyberattack that may have exposed customer contact details and loyalty program information. Sector: Wholesale / Retail Threat class: Cybercrime Status: Confirmed Source:" [X Link](https://x.com/H4ckmanac/status/1996167242011070775) 2025-12-03T10:38Z 103.4K followers, 7051 engagements "🚨Cyberattack Alert Mexico - Aceros Ocotln Group Qilin hacking group claims to have breached Aceros Ocotln Group. Samples have been provided. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached" [X Link](https://x.com/H4ckmanac/status/1996200207319785871) 2025-12-03T12:49Z 103.4K followers, 8089 engagements "🚨Cyberattack Update Japan - Asahi Group Holdings Qilin ransomware group claims responsibility for a ransomware attack on Asahi Group Holdings. The group also claims to have exfiltrated financial documents budgets contracts employee personal data and development plans. The attack caused a global operational disruption halting operations at X breweries and affecting XX company sites. Discover more at" [X Link](https://x.com/H4ckmanac/status/1975538239076290589) 2025-10-07T12:26Z 103.4K followers, 99K engagements "🚨Cyberattack Alert Japan - Renesas Electronics Corporation Coinbase Cartel hacking group claims to have breached Renesas Electronics Corporation. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached" [X Link](https://x.com/H4ckmanac/status/1998278701918933115) 2025-12-09T06:29Z 103.4K followers, 13.3K engagements "🚨Cyberattacks Alert Japan - Starting from September XX the cybercriminal group known as CyberVolk initiated an operation targeting various Japanese infrastructures including Internet Initiative Japan Inc. (IIJ) the National Hearse Association DNA Data Bank of Japan RIKEN GISC Tokyo Asia Pacific Energy Research Centre Japan Advanced Institute of Science and Technology The Japan Oceanographic Data Center (JODC) and Parking Pay. Notably on September XX another threat actor compromised Parking Pay and leaked the data of 267354 users on a hacking forum (our post here: Following the data" [X Link](https://x.com/H4ckmanac/status/1846811662185029961) 2024-10-17T07:13Z 103.3K followers, 52.4K engagements "🚨Data Breach Alert Kuwait - stc Kuwait A threat actor known as ToRmen has claimed responsibility for putting up for sale sensitive employee data from stc Kuwait a telecommunications company and subsidiary of the Saudi Telecom Company (stc Group). The attacker published a sample of more than XXX employee records which allegedly include Civil ID numbers full names personal photos phone numbers and job titles. Discover more at" [X Link](https://x.com/H4ckmanac/status/1930968535238353203) 2025-06-06T12:42Z 103.3K followers, 8240 engagements "🚨Data Breach Alert Saudi Arabia - Alinma Bank A threat actor claims to be selling 700000 bank account records of Alinma Bank customers on a Chinese underground forum. According to the post the data includes full names phone numbers dates of birth and transaction timestamps dating back to June 2025. Discover more at" [X Link](https://x.com/H4ckmanac/status/1939306521050980504) 2025-06-29T12:54Z 103.3K followers, 137.5K engagements "🚨Cyber Attack Alert Japan - Mizuho Financial Group D4RK 4RMY hacking group claims to have breached Mizuho Financial Group. According to the post the cybercriminal group allegedly exfiltrated XXX GB of data. The ransom deadline is set for 21st August 2025. Discover more at" [X Link](https://x.com/H4ckmanac/status/1953427899479912796) 2025-08-07T12:07Z 103.4K followers, 60.2K engagements "🚨Cyberattack Alert USA - Simon Property Group Medusa hacking group claims to have breached Simon Property Group. The attackers demanded a ransom of $1200000. Threat class: Cybercrime Observed: Oct XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached" [X Link](https://x.com/H4ckmanac/status/1983479828503298226) 2025-10-29T10:23Z 103.3K followers, 4162 engagements "🚨Cyber Alert Windows Zero-Day Exploit Actively Abused in Diplomatic Attacks. No Patch Available Yet Chinese group UNC6384 exploited an unpatched Windows zero-day (CVE-2025-9491) to target EU diplomats via spearphishing in SeptemberOctober 2025. Victims downloaded fake EU/NATO docs that deployed PlugX through Canon DLL side-loading allowing data exfiltration. The flaw also used by Evil Corp and Mustang Panda remains unpatched by Microsoft. Source:" [X Link](https://x.com/H4ckmanac/status/1985348276304920874) 2025-11-03T14:08Z 103.4K followers, 39.5K engagements "🚨Cyberattack Alert Japan - Sumitomo Chemical Cl0p hacking group claims to have breached Sumitomo Chemical. This attack is likely part of the ongoing campaign exploiting the zero-day vulnerability in Oracle E-Business Suite. Sector: Manufacturing Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded" [X Link](https://x.com/H4ckmanac/status/1991763395012424058) 2025-11-21T06:59Z 103.3K followers, 9608 engagements "🚨Cyber Alert In the past XX hours the Cl0p hacking group has added XX more alleged victims to its breach campaign exploiting the Zero-day vulnerability in Oracle E-Business Suite Full list: Japan Sumitomo Chemical Japan Mazda Japan Canon United States Oracle Saudi Arabia Aljomaih Automotive Company (AAC) France Michelin United States Broadcom United States Humana Mexico Grupo Bimbo United States A10 United States Envoy United States Greater Cleveland RTA United States Frontrol Inc United States Fruit of the Loom United States Abbott Sri Lanka MAS Holdings United States Trane Technologies" [X Link](https://x.com/H4ckmanac/status/1991776370528252321) 2025-11-21T07:51Z 103.3K followers, 51.5K engagements "🚨Cyber Alert South Korea - Upbit Upbit Halts Operations After Suspicious 44.5B ($33M) Outflow Upbit detected abnormal withdrawals from its Solana hot wallet with about XXXX billion KRW in assets sent to unknown wallets. The exchange immediately suspended deposits and withdrawals shifted funds to cold storage and froze a portion of the assets on-chain. Upbit says customer funds are not impacted and that losses will be covered from its reserves. Source:" [X Link](https://x.com/H4ckmanac/status/1993941422593237230) 2025-11-27T07:14Z 103.3K followers, 5324 engagements "🚨Cyber Alert Japan - Since late August 2025 a widespread malware distribution campaign has been observed targeting organizations like IIJ (Internet Initiative Japan) using phishing emails disguised as copyright infringement notices. These emails use threatening subject lines referencing unauthorized use of copyrighted content and include shortened URLs that lead to ZIP files containing infostealer malware. The primary malware used in these campaigns are Rhadamanthys Stealer and the newly emerging PXA Stealer. Source:" [X Link](https://x.com/H4ckmanac/status/1975827028088602791) 2025-10-08T07:34Z 103.4K followers, 26.1K engagements "🚨Cyber Alert Japan - Nintendo Crimson Collective hacking group known for the breach on Red Hat now claims to have breached Nintendo. Discover more at" [X Link](https://x.com/H4ckmanac/status/1976895206273220758) 2025-10-11T06:18Z 103.4K followers, 1.1M engagements "🚨🚨🚨Cyber Attack Update Japan - ASKUL RansomHouse hacking group has claimed responsibility for the cyberattack against ASKUL. The ransomware caused major disruptions including system outages and the suspension of order and shipping operations. The attacker claims to have exfiltrated XXX TB of data. Sector: Wholesale / Retail Threat class: Cybercrime Observed: Oct XX 2025 Status: Confirmed About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear" [X Link](https://x.com/H4ckmanac/status/1983855830689558896) 2025-10-30T11:17Z 103.4K followers, 132K engagements "🚨Cyber Alert Japan - Internet Initiative Japan (IIJ) The threat actor KaruHunters claims to have breached Internet Initiative Japan (IIJ). According to the attacker the leaked data includes a large collection of source code repositories related to Android development and multimedia libraries. Sector: ICT Threat class: Cybercrime Observed: Nov X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web" [X Link](https://x.com/H4ckmanac/status/1985952532456235517) 2025-11-05T06:09Z 103.4K followers, 124.3K engagements "🚨Cyber Update Japan - Internet Initiative Japan (IIJ) IIJ reports that a person claiming to be part of a cyberattack group posted about stealing its source code. IIJ confirmed the file in question matches one publicly available on its FTP server used for open-source distribution. Cyberattack Status: Rejected ❌" [X Link](https://x.com/H4ckmanac/status/1986008431145447628) 2025-11-05T09:51Z 103.4K followers, 31.5K engagements "🚨Cyber Update Japan - Internet Initiative Japan (IIJ) IIJ reports that a person claiming to be part of a cyberattack group posted about stealing its source code. IIJ confirmed the file in question matches one publicly available on its FTP server used for open-source distribution. Cyberattack Status: Rejected ❌" [X Link](https://x.com/H4ckmanac/status/1986008494814765245) 2025-11-05T09:51Z 103.4K followers, 9890 engagements "🚨Cyber Attack Update Japan - ASKUL RansomHouse hacking group continues to threaten ASKUL and has leaked new data on their DLS in the update titled EVIDENCE PACK X. Sector: Wholesale / Retail Threat class: Cybercrime Status: Confirmed About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached" [X Link](https://x.com/H4ckmanac/status/1987790766006321488) 2025-11-10T07:53Z 103.4K followers, 39.1K engagements "🚨Cyberattack Alert Mexico - Cinvestav (Centro de Investigacin y de Estudios Avanzados ) Coinbase Cartel hacking group claims to have breached Cinvestav. No further information available yet. Sector: Professional / Scientific / Technical Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied" [X Link](https://x.com/H4ckmanac/status/1988972876171706809) 2025-11-13T14:11Z 103.4K followers, 36.2K engagements "Cinvestav samples will be released on Monday XX November together with those of SGK INC Avery Dennison and PACCAR" [X Link](https://x.com/H4ckmanac/status/1988974054041399614) 2025-11-13T14:15Z 103.4K followers, 4236 engagements "🟧 #HackTuesday 🟧 Hack Tuesday: Week XX - XX November 2025 ⚠291 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was Keymous+ claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for 28.5%of incidents with XX cyber attacks. ➡The Gov / Mil / LE sector is the most targeted accounting for XXXX% of incidents with 110cyber attacks. ➡The estimated Critical cyber attacks account to XX (12.7% of the total). ➡Overall the claimed compromised data amounts to approximately XX TB. More details:" [X Link](https://x.com/H4ckmanac/status/1991049407597588522) 2025-11-19T07:42Z 103.4K followers, 8618 engagements "🚨Cyber Alert USA - Crowdstrike CrowdStrike has identified and terminated a malicious insider who leaked internal screenshots to hackers. The incident came to light when screenshots of CrowdStrikes systems appeared on Telegram shared by threat actors from groups including ShinyHunters Scattered Spider and Lapsus$. According to ShinyHunters they paid the insider $25000 to gain access to CrowdStrike's network and received SSO authentication cookies. Status: Confirmed Source:" [X Link](https://x.com/H4ckmanac/status/1991926758585896978) 2025-11-21T17:48Z 103.4K followers, 117.1K engagements "🚨Cyber Alert The Cl0p hacking group lists another 20+ alleged victims in its campaign exploiting the vulnerability in Oracle E-Business Suite. Full list: Al Aseel Zain KSA Mafas AQM Saudi Arabia Korean Air Interoil Colombia DMC-ME KnexTech Legacy Classic Furniture Intellinum Goldstar Pens Hypertherm Aosom IbizSoft Inc MSG (Madison Square Garden) Newline Cloud Incentive Concepts Macys Inventive IT HCMS Partners Northeastern Corp Acroni NAMA Group Anywhere Real Estate VIP Apps Consulting Eighteen Islamabad Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides" [X Link](https://x.com/H4ckmanac/status/1991948036910764177) 2025-11-21T19:13Z 103.4K followers, 39.3K engagements "🚨🚨Cyberattack Alert Spain - Iberia Everest claims to have breached Iberia and stolen XXX GB of data including XXX GB of .eml files with more than X million records. The data allegedly includes names contact details birthdates travel and booking information masked card data and marketing profiles. The group says it had long-term access to Iberias systems and could view or change bookings N.B 1: Iberia Airlines reported on XX November a security incident involving unauthorized access to one of its external providers exposing customer names emails and Iberia Club loyalty IDs. N.B 2: Another" [X Link](https://x.com/H4ckmanac/status/1993367756281201122) 2025-11-25T17:14Z 103.4K followers, 83.6K engagements "🚨Cyber Alert Saudi Arabia - Riyadh Airports The threat actor using the moniker "operation_endgame" is claiming to be selling and to have real-time access to Riyadh Airports internal control panel publishing images that appear to show an active administrative environment for critical systems including device management and live monitoring of Terminal X gates and carousels. The material also seems to expose baggage tracking data with tag IDs scan outcomes timestamps airline references and a full schematic of the airports baggage flow from tagging to exit gates. Sector: Transportation Threat" [X Link](https://x.com/H4ckmanac/status/1993734998067958160) 2025-11-26T17:34Z 103.4K followers, 98.6K engagements "🚨Cyber Alert USA - OpenAI (via Mixpanel service) OpenAI disclosed that Mixpanel a third-party analytics provider used to track API frontend usage suffered unauthorized access on November X. The attacker exfiltrated limited user profile and analytics data for OpenAI API users including names emails location data and browser metadata. No API keys passwords payment information or OpenAI systems were affected. Mixpanel informed OpenAI on November XX after which OpenAI removed Mixpanel from production and notified impacted users Sector: SW / Computer programming and software Threat class:" [X Link](https://x.com/H4ckmanac/status/1993939117491802579) 2025-11-27T07:05Z 103.4K followers, 22.3K engagements "🚨Cyber Alert iOS XX Zero-Click Exploit Claimed for Sale on Dark Web A threat actor called ResearcherX claimed to be selling a full-chain zero-click exploit for iOS XX on the dark web allegedly allowing root access and bypassing new protections. The listing says it compromises devices through a malicious message and exposes data such as photos messages location and Keychain items. Experts note it could be fake but the description resembles past iOS exploits. Status: Pending verification Source:" [X Link](https://x.com/H4ckmanac/status/1994033775987315170) 2025-11-27T13:21Z 103.4K followers, 171.5K engagements "🚨North Korean Hackers Tricked by Fake Remote-Work Laptops North Korean operators were caught in real time after researchers from BCA LTD NorthScan and ANYRUN lured Lazarus Groups Famous Chollima team with fake remote-work laptops. The attackers believed they had access to genuine machines but the devices were decoys designed to observe their activity safely. Source:" [X Link](https://x.com/H4ckmanac/status/1996106748885635422) 2025-12-03T06:38Z 103.4K followers, 71.6K engagements "🚨Cyberattack Alert Taiwan - ASUS Everest hacking group claims to have breached ASUS. Allegedly the attackers exfiltrated more than X TB of data including database contents and camera source code. Sector: ICT Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive" [X Link](https://x.com/H4ckmanac/status/1996123989249294478) 2025-12-03T07:46Z 103.4K followers, 11.8K engagements "🚨Cyberattack Alert United Kingdom - Mainetti UK Qilin hacking group claims to have breached Mainetti UK. The attackers had previously listed the company in July 2025. Sector: Wholesale / Retail Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were" [X Link](https://x.com/H4ckmanac/status/1996498183900336195) 2025-12-04T08:33Z 103.4K followers, 4918 engagements "🚨Cyber Alert - Tokyo Electron Taiwan Ltd. (subsidiary of Tokyo Electron) Tokyo Electron reports that Taiwanese prosecutors have indicted its subsidiary Tokyo Electron Taiwan Ltd. for inadequate supervision after a former employee leaked confidential customer information. The employee had already been arrested and charged. Sector: Manufacturing Threat class: Cybercrime Status: Confirmed Source:" [X Link](https://x.com/H4ckmanac/status/1996498435625918505) 2025-12-04T08:34Z 103.4K followers, 14.7K engagements "🚨Cyberattack Alert Zambia - National Health Insurance Scheme (NHIS) Nova hacking group claims to have breached National Health Insurance Scheme (NHIS). Allegedly the attackers exfiltrated patients data. Sector: Insurance Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed" [X Link](https://x.com/H4ckmanac/status/1996808222246686892) 2025-12-05T05:05Z 103.4K followers, 5025 engagements "🚨Cyberattack Alert Japan - Yazaki Group INC Ransom hacking group claims to have breached Yazaki Group. Allegedly the attackers exfiltrated XXX GB of data including confidential documents client data NDAs financial and operational data HR records (including medical data) business agreements technical drawings and production documentation related to major automakers such as BMW Nissan Scania and others. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its" [X Link](https://x.com/H4ckmanac/status/1997907405183893652) 2025-12-08T05:53Z 103.4K followers, 17.1K engagements "🟧 #HackTuesday 🟧 Hack Tuesday: Week XX - XX December 2025 ⚠255 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was NoName057(16) claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for XXXX% of incidents with XX cyber attacks. ➡The Professional / Scientific / Technicalsector is the most targeted accounting for XXXX% of incidents with XX cyber attacks. ➡The estimated Critical cyber attacks account to XX (5.9% of the total). ➡Overall the claimed compromised data amounts to approximately XXXX TB. More details:" [X Link](https://x.com/H4ckmanac/status/1998400505924772160) 2025-12-09T14:33Z 103.4K followers, 6862 engagements "🚨Cyberattack Alert Cyprus - Bank of Cyprus Oncology Center (BOCOC) BOCOC has allegedly been breached. Allegedly the attackers gained unauthorised access to critical hospital systems including GESY and Mosaiq. The attackers state they did not encrypt or disrupt operations but published an initial batch of sensitive data. Sector: Healthcare Threat class: Cybercrime Observed: Dec XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our" [X Link](https://x.com/H4ckmanac/status/1998700104254148832) 2025-12-10T10:23Z 103.4K followers, 2465 engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@H4ckmanac HackmanacHackmanac posts on X about status, japan, $3774t, bank the most. They currently have XXXXXXX followers and XX posts still getting attention that total XXXXXX engagements in the last XX hours.
Social category influence countries XXXXX% technology brands XXXXX% stocks XXXXX% finance XXXX% exchanges #937 travel destinations XXXX% automotive brands XXXX% cryptocurrencies XXXX% currencies XXXX% gaming XXXX%
Social topic influence status #3063, japan #2292, $3774t #1, bank #2384, saudi arabia #1080, accounting #58, countries #1093, oracle 4.55%, spain #1232, france XXXX%
Top accounts mentioned or mentioned by @cybooto @fakeemail683123
Top assets mentioned Coinbase Global, Inc. (COIN) Mizuho Financial Group, Inc. (MFG) Solana (SOL) Crowdstrike Holdings Inc (CRWD)
Top posts by engagements in the last XX hours
"🚨 🚨 🧠 : Free access to dashboards timely alerts attack trends threat actor insights affected regions and severity metrics powered by our proprietary ESIX (Estimated Severity Index). 🌐 : 📌 LinkedIn 📌 Telegram Channel 📌 Community Chat 📌 Bluesky 📥 : 50+ pages 8000+ confirmed attacks analysed top trends targeted industries threat actors and global impact breakdowns. 📅 : 🔍 #HackTuesday confirmed attacks victims threat actors and attack methods 📉 #RiskFriday weekly impact snapshot by industry country and threat actor powered by ESIX 🎯 : We empower CISOs security managers"
X Link 2025-11-26T06:24Z 103.4K followers, 28.1K engagements
"🚨Cyber Alert Indonesia - Bank Mandiri BreachLaboratory threat actor claims to have breached Bank Mandiri. Allegedly the attackers leaked more than 18000 financial records including personal details SWIFT code BMRIIDJA account setup data balances fees and debit card usage information. Sector: Financial Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web"
X Link 2025-11-27T17:06Z 103.4K followers, 16.6K engagements
"🚨Cyber Alert Spain - In the past XX hours the hacktivist group NoName057(16) claims to have carried out an intensive DDoS campaign against Spanish infrastructure listing XX new targets and bringing the total to at least XX since November XX. - CACESA - S2GRUPO - Autoridad Portuaria de Cartagena - Ports of Las Palmas - Canal de Isabel II - Mumken - Ayuntamiento de Toledo - Concello de Santiago de Compostela - Cmara de Comercio e Industria de Madrid - Diputacin de Lleida - Metro Bilbao S.A. - Innovasur - Ayuntamiento de Bilbao - Ciberso - Axians Spain - AuthUSB - Advens - Jtsec Beyond IT"
X Link 2025-11-28T08:25Z 103.4K followers, 56.4K engagements
"🟧 #HackTuesday 🟧 Hack Tuesday: Week XX Nov - XX Dec 2025 ⚠378 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was NoName057(16) claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for XXXX% of incidents with XXX cyber attacks. ➡The Gov / Mil / LE sector is the most targeted accounting for XXXX% of incidents with XX cyber attacks. ➡The estimated Critical cyber attacks account to XX (10.4% of the total). ➡Overall the claimed compromised data amounts to approximately XX TB. More details:"
X Link 2025-12-03T10:14Z 103.4K followers, 9816 engagements
"🚨Cyber Alert France - Leroy Merlin Leroy Merlin reports that it has suffered a cyberattack that may have exposed customer contact details and loyalty program information. Sector: Wholesale / Retail Threat class: Cybercrime Status: Confirmed Source:"
X Link 2025-12-03T10:38Z 103.4K followers, 7051 engagements
"🚨Cyberattack Alert Mexico - Aceros Ocotln Group Qilin hacking group claims to have breached Aceros Ocotln Group. Samples have been provided. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached"
X Link 2025-12-03T12:49Z 103.4K followers, 8089 engagements
"🚨Cyberattack Update Japan - Asahi Group Holdings Qilin ransomware group claims responsibility for a ransomware attack on Asahi Group Holdings. The group also claims to have exfiltrated financial documents budgets contracts employee personal data and development plans. The attack caused a global operational disruption halting operations at X breweries and affecting XX company sites. Discover more at"
X Link 2025-10-07T12:26Z 103.4K followers, 99K engagements
"🚨Cyberattack Alert Japan - Renesas Electronics Corporation Coinbase Cartel hacking group claims to have breached Renesas Electronics Corporation. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached"
X Link 2025-12-09T06:29Z 103.4K followers, 13.3K engagements
"🚨Cyberattacks Alert Japan - Starting from September XX the cybercriminal group known as CyberVolk initiated an operation targeting various Japanese infrastructures including Internet Initiative Japan Inc. (IIJ) the National Hearse Association DNA Data Bank of Japan RIKEN GISC Tokyo Asia Pacific Energy Research Centre Japan Advanced Institute of Science and Technology The Japan Oceanographic Data Center (JODC) and Parking Pay. Notably on September XX another threat actor compromised Parking Pay and leaked the data of 267354 users on a hacking forum (our post here: Following the data"
X Link 2024-10-17T07:13Z 103.3K followers, 52.4K engagements
"🚨Data Breach Alert Kuwait - stc Kuwait A threat actor known as ToRmen has claimed responsibility for putting up for sale sensitive employee data from stc Kuwait a telecommunications company and subsidiary of the Saudi Telecom Company (stc Group). The attacker published a sample of more than XXX employee records which allegedly include Civil ID numbers full names personal photos phone numbers and job titles. Discover more at"
X Link 2025-06-06T12:42Z 103.3K followers, 8240 engagements
"🚨Data Breach Alert Saudi Arabia - Alinma Bank A threat actor claims to be selling 700000 bank account records of Alinma Bank customers on a Chinese underground forum. According to the post the data includes full names phone numbers dates of birth and transaction timestamps dating back to June 2025. Discover more at"
X Link 2025-06-29T12:54Z 103.3K followers, 137.5K engagements
"🚨Cyber Attack Alert Japan - Mizuho Financial Group D4RK 4RMY hacking group claims to have breached Mizuho Financial Group. According to the post the cybercriminal group allegedly exfiltrated XXX GB of data. The ransom deadline is set for 21st August 2025. Discover more at"
X Link 2025-08-07T12:07Z 103.4K followers, 60.2K engagements
"🚨Cyberattack Alert USA - Simon Property Group Medusa hacking group claims to have breached Simon Property Group. The attackers demanded a ransom of $1200000. Threat class: Cybercrime Observed: Oct XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached"
X Link 2025-10-29T10:23Z 103.3K followers, 4162 engagements
"🚨Cyber Alert Windows Zero-Day Exploit Actively Abused in Diplomatic Attacks. No Patch Available Yet Chinese group UNC6384 exploited an unpatched Windows zero-day (CVE-2025-9491) to target EU diplomats via spearphishing in SeptemberOctober 2025. Victims downloaded fake EU/NATO docs that deployed PlugX through Canon DLL side-loading allowing data exfiltration. The flaw also used by Evil Corp and Mustang Panda remains unpatched by Microsoft. Source:"
X Link 2025-11-03T14:08Z 103.4K followers, 39.5K engagements
"🚨Cyberattack Alert Japan - Sumitomo Chemical Cl0p hacking group claims to have breached Sumitomo Chemical. This attack is likely part of the ongoing campaign exploiting the zero-day vulnerability in Oracle E-Business Suite. Sector: Manufacturing Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded"
X Link 2025-11-21T06:59Z 103.3K followers, 9608 engagements
"🚨Cyber Alert In the past XX hours the Cl0p hacking group has added XX more alleged victims to its breach campaign exploiting the Zero-day vulnerability in Oracle E-Business Suite Full list: Japan Sumitomo Chemical Japan Mazda Japan Canon United States Oracle Saudi Arabia Aljomaih Automotive Company (AAC) France Michelin United States Broadcom United States Humana Mexico Grupo Bimbo United States A10 United States Envoy United States Greater Cleveland RTA United States Frontrol Inc United States Fruit of the Loom United States Abbott Sri Lanka MAS Holdings United States Trane Technologies"
X Link 2025-11-21T07:51Z 103.3K followers, 51.5K engagements
"🚨Cyber Alert South Korea - Upbit Upbit Halts Operations After Suspicious 44.5B ($33M) Outflow Upbit detected abnormal withdrawals from its Solana hot wallet with about XXXX billion KRW in assets sent to unknown wallets. The exchange immediately suspended deposits and withdrawals shifted funds to cold storage and froze a portion of the assets on-chain. Upbit says customer funds are not impacted and that losses will be covered from its reserves. Source:"
X Link 2025-11-27T07:14Z 103.3K followers, 5324 engagements
"🚨Cyber Alert Japan - Since late August 2025 a widespread malware distribution campaign has been observed targeting organizations like IIJ (Internet Initiative Japan) using phishing emails disguised as copyright infringement notices. These emails use threatening subject lines referencing unauthorized use of copyrighted content and include shortened URLs that lead to ZIP files containing infostealer malware. The primary malware used in these campaigns are Rhadamanthys Stealer and the newly emerging PXA Stealer. Source:"
X Link 2025-10-08T07:34Z 103.4K followers, 26.1K engagements
"🚨Cyber Alert Japan - Nintendo Crimson Collective hacking group known for the breach on Red Hat now claims to have breached Nintendo. Discover more at"
X Link 2025-10-11T06:18Z 103.4K followers, 1.1M engagements
"🚨🚨🚨Cyber Attack Update Japan - ASKUL RansomHouse hacking group has claimed responsibility for the cyberattack against ASKUL. The ransomware caused major disruptions including system outages and the suspension of order and shipping operations. The attacker claims to have exfiltrated XXX TB of data. Sector: Wholesale / Retail Threat class: Cybercrime Observed: Oct XX 2025 Status: Confirmed About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear"
X Link 2025-10-30T11:17Z 103.4K followers, 132K engagements
"🚨Cyber Alert Japan - Internet Initiative Japan (IIJ) The threat actor KaruHunters claims to have breached Internet Initiative Japan (IIJ). According to the attacker the leaked data includes a large collection of source code repositories related to Android development and multimedia libraries. Sector: ICT Threat class: Cybercrime Observed: Nov X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web"
X Link 2025-11-05T06:09Z 103.4K followers, 124.3K engagements
"🚨Cyber Update Japan - Internet Initiative Japan (IIJ) IIJ reports that a person claiming to be part of a cyberattack group posted about stealing its source code. IIJ confirmed the file in question matches one publicly available on its FTP server used for open-source distribution. Cyberattack Status: Rejected ❌"
X Link 2025-11-05T09:51Z 103.4K followers, 31.5K engagements
"🚨Cyber Update Japan - Internet Initiative Japan (IIJ) IIJ reports that a person claiming to be part of a cyberattack group posted about stealing its source code. IIJ confirmed the file in question matches one publicly available on its FTP server used for open-source distribution. Cyberattack Status: Rejected ❌"
X Link 2025-11-05T09:51Z 103.4K followers, 9890 engagements
"🚨Cyber Attack Update Japan - ASKUL RansomHouse hacking group continues to threaten ASKUL and has leaked new data on their DLS in the update titled EVIDENCE PACK X. Sector: Wholesale / Retail Threat class: Cybercrime Status: Confirmed About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were redacted from the attached"
X Link 2025-11-10T07:53Z 103.4K followers, 39.1K engagements
"🚨Cyberattack Alert Mexico - Cinvestav (Centro de Investigacin y de Estudios Avanzados ) Coinbase Cartel hacking group claims to have breached Cinvestav. No further information available yet. Sector: Professional / Scientific / Technical Threat class: Cybercrime Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied"
X Link 2025-11-13T14:11Z 103.4K followers, 36.2K engagements
"Cinvestav samples will be released on Monday XX November together with those of SGK INC Avery Dennison and PACCAR"
X Link 2025-11-13T14:15Z 103.4K followers, 4236 engagements
"🟧 #HackTuesday 🟧 Hack Tuesday: Week XX - XX November 2025 ⚠291 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was Keymous+ claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for 28.5%of incidents with XX cyber attacks. ➡The Gov / Mil / LE sector is the most targeted accounting for XXXX% of incidents with 110cyber attacks. ➡The estimated Critical cyber attacks account to XX (12.7% of the total). ➡Overall the claimed compromised data amounts to approximately XX TB. More details:"
X Link 2025-11-19T07:42Z 103.4K followers, 8618 engagements
"🚨Cyber Alert USA - Crowdstrike CrowdStrike has identified and terminated a malicious insider who leaked internal screenshots to hackers. The incident came to light when screenshots of CrowdStrikes systems appeared on Telegram shared by threat actors from groups including ShinyHunters Scattered Spider and Lapsus$. According to ShinyHunters they paid the insider $25000 to gain access to CrowdStrike's network and received SSO authentication cookies. Status: Confirmed Source:"
X Link 2025-11-21T17:48Z 103.4K followers, 117.1K engagements
"🚨Cyber Alert The Cl0p hacking group lists another 20+ alleged victims in its campaign exploiting the vulnerability in Oracle E-Business Suite. Full list: Al Aseel Zain KSA Mafas AQM Saudi Arabia Korean Air Interoil Colombia DMC-ME KnexTech Legacy Classic Furniture Intellinum Goldstar Pens Hypertherm Aosom IbizSoft Inc MSG (Madison Square Garden) Newline Cloud Incentive Concepts Macys Inventive IT HCMS Partners Northeastern Corp Acroni NAMA Group Anywhere Real Estate VIP Apps Consulting Eighteen Islamabad Observed: Nov XX 2025 Status: Pending verification About this post: Hackmanac provides"
X Link 2025-11-21T19:13Z 103.4K followers, 39.3K engagements
"🚨🚨Cyberattack Alert Spain - Iberia Everest claims to have breached Iberia and stolen XXX GB of data including XXX GB of .eml files with more than X million records. The data allegedly includes names contact details birthdates travel and booking information masked card data and marketing profiles. The group says it had long-term access to Iberias systems and could view or change bookings N.B 1: Iberia Airlines reported on XX November a security incident involving unauthorized access to one of its external providers exposing customer names emails and Iberia Club loyalty IDs. N.B 2: Another"
X Link 2025-11-25T17:14Z 103.4K followers, 83.6K engagements
"🚨Cyber Alert Saudi Arabia - Riyadh Airports The threat actor using the moniker "operation_endgame" is claiming to be selling and to have real-time access to Riyadh Airports internal control panel publishing images that appear to show an active administrative environment for critical systems including device management and live monitoring of Terminal X gates and carousels. The material also seems to expose baggage tracking data with tag IDs scan outcomes timestamps airline references and a full schematic of the airports baggage flow from tagging to exit gates. Sector: Transportation Threat"
X Link 2025-11-26T17:34Z 103.4K followers, 98.6K engagements
"🚨Cyber Alert USA - OpenAI (via Mixpanel service) OpenAI disclosed that Mixpanel a third-party analytics provider used to track API frontend usage suffered unauthorized access on November X. The attacker exfiltrated limited user profile and analytics data for OpenAI API users including names emails location data and browser metadata. No API keys passwords payment information or OpenAI systems were affected. Mixpanel informed OpenAI on November XX after which OpenAI removed Mixpanel from production and notified impacted users Sector: SW / Computer programming and software Threat class:"
X Link 2025-11-27T07:05Z 103.4K followers, 22.3K engagements
"🚨Cyber Alert iOS XX Zero-Click Exploit Claimed for Sale on Dark Web A threat actor called ResearcherX claimed to be selling a full-chain zero-click exploit for iOS XX on the dark web allegedly allowing root access and bypassing new protections. The listing says it compromises devices through a malicious message and exposes data such as photos messages location and Keychain items. Experts note it could be fake but the description resembles past iOS exploits. Status: Pending verification Source:"
X Link 2025-11-27T13:21Z 103.4K followers, 171.5K engagements
"🚨North Korean Hackers Tricked by Fake Remote-Work Laptops North Korean operators were caught in real time after researchers from BCA LTD NorthScan and ANYRUN lured Lazarus Groups Famous Chollima team with fake remote-work laptops. The attackers believed they had access to genuine machines but the devices were decoys designed to observe their activity safely. Source:"
X Link 2025-12-03T06:38Z 103.4K followers, 71.6K engagements
"🚨Cyberattack Alert Taiwan - ASUS Everest hacking group claims to have breached ASUS. Allegedly the attackers exfiltrated more than X TB of data including database contents and camera source code. Sector: ICT Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive"
X Link 2025-12-03T07:46Z 103.4K followers, 11.8K engagements
"🚨Cyberattack Alert United Kingdom - Mainetti UK Qilin hacking group claims to have breached Mainetti UK. The attackers had previously listed the company in July 2025. Sector: Wholesale / Retail Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed and sensitive details were"
X Link 2025-12-04T08:33Z 103.4K followers, 4918 engagements
"🚨Cyber Alert - Tokyo Electron Taiwan Ltd. (subsidiary of Tokyo Electron) Tokyo Electron reports that Taiwanese prosecutors have indicted its subsidiary Tokyo Electron Taiwan Ltd. for inadequate supervision after a former employee leaked confidential customer information. The employee had already been arrested and charged. Sector: Manufacturing Threat class: Cybercrime Status: Confirmed Source:"
X Link 2025-12-04T08:34Z 103.4K followers, 14.7K engagements
"🚨Cyberattack Alert Zambia - National Health Insurance Scheme (NHIS) Nova hacking group claims to have breached National Health Insurance Scheme (NHIS). Allegedly the attackers exfiltrated patients data. Sector: Insurance Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded copied or redistributed"
X Link 2025-12-05T05:05Z 103.4K followers, 5025 engagements
"🚨Cyberattack Alert Japan - Yazaki Group INC Ransom hacking group claims to have breached Yazaki Group. Allegedly the attackers exfiltrated XXX GB of data including confidential documents client data NDAs financial and operational data HR records (including medical data) business agreements technical drawings and production documentation related to major automakers such as BMW Nissan Scania and others. Sector: Manufacturing Threat class: Cybercrime Observed: Dec X 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its"
X Link 2025-12-08T05:53Z 103.4K followers, 17.1K engagements
"🟧 #HackTuesday 🟧 Hack Tuesday: Week XX - XX December 2025 ⚠255 cyber attacks across XX countries ⚠ ➡The most active threat actor last week was NoName057(16) claiming responsibility for XX cyber attacks. ➡The USA is the most affected country accounting for XXXX% of incidents with XX cyber attacks. ➡The Professional / Scientific / Technicalsector is the most targeted accounting for XXXX% of incidents with XX cyber attacks. ➡The estimated Critical cyber attacks account to XX (5.9% of the total). ➡Overall the claimed compromised data amounts to approximately XXXX TB. More details:"
X Link 2025-12-09T14:33Z 103.4K followers, 6862 engagements
"🚨Cyberattack Alert Cyprus - Bank of Cyprus Oncology Center (BOCOC) BOCOC has allegedly been breached. Allegedly the attackers gained unauthorised access to critical hospital systems including GESY and Mosaiq. The attackers state they did not encrypt or disrupt operations but published an initial batch of sensitive data. Sector: Healthcare Threat class: Cybercrime Observed: Dec XX 2025 Status: Pending verification About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our"
X Link 2025-12-10T10:23Z 103.4K followers, 2465 engagements
/creator/twitter::H4ckmanac