Hellcat

parsing : enabled

Urls
Screen
http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion
Screen
File servers
Screen

Posts

Date Title Description Screen
2024-11-15
Pinger - USA We have successfully breached Pinger’s infrastructure, acquiring 111 GB of highly sensitive data. This includes over 9 million user records, private messages, voice messages, internal tools (such as phone number lookup and notification sender), backend systems, and source codes. Pinger, a global leader in free texting and calling solutions with millions of active users, is now at risk of having its proprietary data and user information exposed, potentially causing significant reputational and operational damage. To secure the deletion of this data and prevent its public release, we demand a payment of $150,000 USD in Monero (XMR) or Bitcoin (BTC). Failure to comply will result in the immediate dissemination of the compromised information.
2024-11-04
College of Business - Tanzania We have successfully accessed and compromised over 500,000 student records from the College of Business Education in Tanzania. This leak includes a substantial amount of personally identifiable information (PII), such as full names, phone numbers, and email addresses. Additionally, the records may contain billing and financial information. You can now download the full Database.
2024-11-04
Ministry of Education - Jordan We have successfully accessed and compromised a range of sensitive documents from Jordan's Ministry of Education. This includes images of identification cards, divorce papers, and various letters addressed to the Minister. You can now download the full dataset.
2024-11-04
Schneider Electric - France We have successfully breached Schneider Electric’s infrastructure, accessing their Atlassian Jira system. This breach has compromised critical data, including projects, issues, and plugins, along with over 400,000 rows of user data, totaling more than 40GB Compressed Data. Schneider Electric, a leader in energy management and automation with annual revenue exceeding $40 billion, is now at risk of exposing sensitive customer and operational information. To secure the deletion of this data and prevent its public release, we require a payment of $125,000 USD in Baguettes. Failure to meet this demand will result in the dissemination of the compromised information. Stating this breach will decrease the ransom by 50%, its your choice Olivier...
2024-11-04
Contact us Do you have any questions? Was your company breached or locked by us? Never hesitate to contact us. You can find our PGP key here. Signed onion address: Hidden Service.
2024-10-25
??? ?????????? Wait for us ... #HELLCAT
2024-10-25
The Knesset - Israel Using exposed authentication keys, we successfully accessed 45GB of sensitive data from the Knesset's internal systems. The compromised data includes confidential documents, internal communications, and various classified information. Ransom Demand:$200,000 To prevent the public release of this data, we require a payment of $200,000 in Monero. If the demand is not met, the full dataset will be disclosed. You can download a sample of 1.94 GB from Knesset Meeting Protocols here:
2024-10-25
Who are we? We are the #HELLCAT group, a ... Nothing. You can find our PGP key here. Signed onion address: Hidden Service.