📢 Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Get foundational access to breach intelligence — track breaches, leaks, and threats in real-time with unfiltered screenshots and expert summaries.
⚠ Disclaimer
This report includes actual screenshots and/or text that may include unredacted personally identifiable information (PII) gathered from publicly available sources. The sensitive information presented within this report is intended solely for cybersecurity awareness and threat intelligence purposes. Dark Web Informer explicitly condemns unauthorized access, distribution, or misuse of the personal data displayed or referenced here. Users must treat exposed data responsibly and ethically.
📌 Overview
Threat actor Sophia01 has posted a listing offering the sale of a 200,000-record database allegedly exfiltrated from Podoservice.es, a Spanish manufacturing company. The leak reportedly contains a wide array of customer and employee details, including names, physical addresses, phone numbers, DNI, email addresses, city/postal info, birthdates, and hashed passwords. The database structure resembles a CRM or B2B user portal export and appears to be formatted for MySQL or CSV-based systems. The actor previously offered a similar listing from SCP Spain, and Podoservice itself was reportedly breached once before in July 2024.
📊 Key Details
Attribute | Information |
---|---|
Date | 2025-06-09, 1:21:14 PM |
Threat Actor | Sophia01 |
Victim Country | Spain |
Industry | Manufacturing |
Organization | Podoservice |
Victim Site | podoservice.es |
Category | Data Breach |
Severity | Medium |
Network | openweb |
Subscriber-only content…