Back to all articles
data-breachransomwaredark-webweekly-roundupthreat-intelligence

Weekly Breach Roundup: 250M+ Records Exposed in 10 Days

Critical security incidents from Dec 24 to Jan 2: Kraken exchange panel access, 20M Experian records, 160M French phone numbers, Solana private keys, and 30+ breaches across global organizations.

CIFER Security Team8 min read

The final week of 2025 and opening days of 2026 brought a relentless wave of security incidents — with over 250 million records exposed across more than 30 organizations globally. From cryptocurrency exchange panel access to government data exfiltration, here's what defenders need to know.

The Numbers at a Glance

MetricCount
Total records exposed250M+
Ransomware victims15+ organizations
Countries affected12+
Access listings sold10+
Cryptocurrency-related3 major incidents

Critical Incidents

Kraken Exchange: Admin Panel Access Sold

Date: January 2, 2026

Threat actors are selling read-only access to Kraken's internal admin panel — exposing complete KYC data, government IDs, selfies, and transaction histories. The listing includes phishing tooling priced from just $1.

Why it matters: Even "read-only" access enables devastating social engineering attacks. Attackers can reference real transaction details, generate support tickets, and target high-value accounts with inside knowledge.

Read our full analysis →


Experian: 20M+ Consumer Records

Date: December 30, 2025

Credit bureau giant Experian allegedly suffered a breach exposing over 20 million consumer records — potentially including credit scores, payment histories, and personal identifiers.

Data TypeRisk Level
Credit scoresIdentity fraud, loan fraud
Payment historiesFinancial profiling
Personal identifiersAccount takeover
Address historiesPhysical security risk

Impact: Credit bureau breaches are particularly dangerous because the data is designed to verify identity — making it perfect for identity theft.


France Mobile Database: 160M Phone Numbers

Date: December 25, 2025

A massive database containing 160 million French phone numbers appeared for sale on dark web forums — a significant portion of France's population.

Attack enablement:

  • SIM swapping campaigns at scale
  • SMS phishing (smishing) operations
  • Voice phishing (vishing) targeting
  • Account recovery exploitation

Solana Wallets: 171K Private Keys

Date: December 30, 2025

171,000 Solana wallet private keys were offered for sale — representing direct access to cryptocurrency holdings with no recovery possible for victims.

Private key compromise = Total loss
No 2FA · No recovery · No reversal

Root causes likely include:

  • Malware-infected wallet generators
  • Compromised browser extensions
  • Phishing sites mimicking legitimate wallets
  • Clipboard hijacking malware

European Space Agency: 200GB Data Leak

Date: December 27, 2025

ESA confirmed a breach after attackers claimed 200GB of data including source code, API tokens, Terraform configurations, and hardcoded credentials from collaboration servers.

Read our full analysis →


Ransomware Activity

Ransomware groups remained active through the holiday period, exploiting reduced staffing and delayed incident response.

SAFEPAY Operations (December 29)

Victim RegionCount
European Union5
United States4
Total9

PLAY Ransomware (December 29)

Victim RegionCount
United States3
Canada2
Total5

Individual Ransomware Victims

OrganizationCountryDate
DGM ITIsraelJan 1
Hunneman Real EstateUnited StatesDec 31
Falk Waas Law FirmUnited StatesDec 30
Salvation ArmyUnited StatesDec 25

Holiday timing: Ransomware operators deliberately target holiday periods when IT teams are understaffed and response times are slower.


Corporate & Infrastructure Breaches

Massive Data Exposures

OrganizationRecords/DataCountryDate
YouNow22M accountsGlobalJan 1
Tokyo FM3M+ listener recordsJapanJan 1
Wired2.3M recordsUnited StatesDec 27
Hellowork2.8M job seekersFranceDec 24
Kassy.ru300K usersRussiaDec 29

Industrial & Infrastructure Targets

OrganizationData VolumeSectorDate
Pickett USA Engineering139 GBInfrastructure/UtilitiesJan 1
Total ETO ERP29 GBEnterprise SoftwareDec 31
KPRJ180 GBGovernment (Malaysia)Dec 30
DGM IT526 GBIT Services (Israel)Jan 1

Access Sales: The Growing Threat

Beyond data dumps, threat actors are increasingly selling persistent access to compromised systems — enabling future attacks.

Access Listings This Week

TargetAccess TypePrice/DetailDate
GitHub reposAdmin API keys$50K eachDec 29
DID panel$12M balance accessUndisclosedDec 30
Taiwan manufacturerVPN + local adminSoldDec 31
UAE finance/insuranceInitial accessSoldDec 26
French universityUnauthorized accessSoldDec 25
Forti Web adminAdmin panel accessSoldDec 25
Vietnam Tax DeptEmployee emailSoldDec 31
Singapore office suppliesDB + shellSoldDec 28
U.S. student systemSystem accessSoldDec 25

Credential & Financial Data

Forti VPN Credentials

December 30: Approximately 1,000 valid Fortinet VPN credentials sold globally — providing direct network access to enterprise environments.

Critical because:

  • VPN credentials bypass perimeter security entirely
  • Often grant internal network access immediately
  • May remain valid for extended periods if not rotated

UK Credit Cards

December 30: 486 UK credit cards sold with claimed 70–90% validity rate — indicating recent theft from active payment systems.


Educational & Government Sector

OrganizationData ExposedCountryDate
ENSAI Engineering SchoolStudents, payments, photos, source codeFranceDec 31
KPRJ180 GB government dataMalaysiaDec 30
Vietnam Tax DepartmentEmployee email accessVietnamDec 31
Unidentified French universitySystem access soldFranceDec 25
U.S. student information systemAccess soldUnited StatesDec 25

Educational institutions remain prime targets due to:

  • Large PII datasets (students, staff, alumni)
  • Often underfunded security programs
  • Complex, distributed IT environments
  • Valuable research data

Regional Breakdown

By Geography

RegionIncidents
United States9
France4
Global/Multi-region4
Japan1
Israel1
Malaysia1
Taiwan1
Singapore1
Indonesia2
Vietnam1
Spain1
UAE1
Russia1
United Kingdom1

By Sector

SectorIncidents
Financial Services5
Technology/IT4
Government3
Education3
Media/Entertainment3
Manufacturing2
Cryptocurrency2
Real Estate2
Healthcare/Non-profit1
Others5+

Patterns & Takeaways

1. Holiday Exploitation

Threat actors aggressively targeted the Dec 24–Jan 2 period. Organizations should:

  • Maintain security operations coverage during holidays
  • Pre-position incident response capabilities
  • Implement automated detection and response

2. Access-as-a-Service

The proliferation of access sales (VPN credentials, admin panels, API keys) indicates a maturing cybercrime ecosystem where initial access is commoditized.

3. Credential Exposure Remains Endemic

From hardcoded secrets in source code to VPN credentials for sale, credential management failures underpin most breaches. Solutions include:

  • Secrets management platforms
  • Automatic credential rotation
  • Zero standing privileges
  • Hardware security modules

4. Scale of Data Aggregation

When 160M phone numbers or 20M credit records are breached, the data enables attacks far beyond the original victims — fueling fraud, phishing, and identity theft for years.


Defensive Recommendations

Immediate Actions

  1. Rotate credentials — especially VPN, admin panels, API keys
  2. Audit external-facing systems — collaboration tools, development infrastructure
  3. Enable MFA everywhere — particularly on privileged accounts
  4. Monitor dark web — for mentions of your organization
  5. Review holiday coverage — ensure security operations continuity

Strategic Improvements

  • Implement zero-trust architecture — assume breach, verify everything
  • Encrypt data at rest and in transit — limit breach impact
  • Segment networks — prevent lateral movement
  • Deploy endpoint detection — catch ransomware early
  • Conduct tabletop exercises — prepare for incident response

Key Takeaways

  • 250M+ records exposed across 30+ organizations in 10 days
  • Holiday periods are prime attack windows — threat actors exploit reduced staffing
  • Access sales are proliferating — credentials, panels, and API keys traded as commodities
  • Ransomware remains active — SAFEPAY and PLAY groups claimed 14+ victims
  • Credential failures underpin most breaches — from VPN access to hardcoded secrets

The velocity and scale of these incidents demonstrate that traditional security perimeters are insufficient. Organizations must assume breach and protect data at its source — ensuring that even when systems are compromised, sensitive information remains encrypted and unusable to attackers.


Want to ensure your data remains protected even when systems are breached? Learn how CIFER's encryption architecture keeps data safe regardless of infrastructure compromise.