Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web

Posted on July 30, 2025July 30, 2025 By CWS

A financially motivated menace actor often called Lionishackers has emerged as a major participant within the illicit market for company information in latest months.

Leveraging opportunistic focusing on and a desire for Asian-based victims, the group employs automated SQL injection instruments to breach database servers, exfiltrate delicate information, and checklist them on the market on underground boards and Telegram channels.

Although not overtly ransomware-based, their mannequin displays a type of “double extortion” by monetizing stolen information straight quite than encrypting and demanding fee for decryption.

Outpost24 analysts famous that Lionishackers initially surfaced in September 2024, rapidly establishing a fame by means of proof-of-compromise screenshots and pattern excerpts shared throughout a number of underground platforms.

The group’s communication technique entails sustaining quite a few discussion board aliases—every tied to similar Telegram contact info—thereby evading long-term attribution whereas preserving purchaser outreach.

Their companies have diversified past company information to incorporate social media and electronic mail credential databases, in addition to ancillary choices resembling DDoS botnets and discussion board internet hosting tasks.

As Lionishackers’ exercise accelerated, their affect on focused organizations grew to become more and more obvious. Victims span authorities our bodies, telecommunications corporations, pharmaceutical firms, instructional establishments, retail chains, and notably, playing websites.

Information units exfiltrated have included personally identifiable info (PII), monetary information, and authentication credentials—components readily exploited for identification theft, account takeover, or company espionage.

The group’s ways underscore the rising efficiency of database-focused cybercrime, which might inflict profound reputational and monetary hurt with out deploying conventional ransomware.

Outpost24 researchers recognized that the group’s specialization in SQL-based assaults and reliance on extensively accessible automation frameworks allow fast compromise and scaling.

The transition from remoted database gross sales to extra choices—such because the Ghost botnet for network-layer DDoS—demonstrates their evolving prison enterprise.

Lionishackers commercializing the Ghost botnet in Telegram (Supply – Outpost24)

A Telegram commercial showcasing Ghost’s capabilities. Whereas the short-lived “Pressured Boards” challenge launched amid legislation enforcement scrutiny of BreachForums.

Lionishackers selling the creation of the Pressured Boards (Supply – Outpost24)

An infection Mechanism and Persistence Ways

A more in-depth examination reveals that Lionishackers primarily exploit SQL injection vulnerabilities in poorly configured internet purposes.

By leveraging instruments like SQLmap, they automate reconnaissance and payload supply.

A typical injection sequence noticed by Outpost24 follows:-

sqlmap -u ”
–batch –dbs –threads=5
–tamper=space2comment –time-sec=10

This command probes for injectable parameters, enumerates databases, and extracts desk contents.

As soon as credentials are retrieved, the attackers typically reuse legitimate login info to pivot deeper into inside networks.

Lionishackers utilizing the alias Captain Fen present desire in compromising on line casino websites (Supply – Outpost24)

Persistence is achieved by means of the deployment of light-weight backdoors—continuously easy internet shells—hidden in momentary directories or disguised as innocuous replace scripts.

Submit on Telegram itemizing a number of the nations that Lionishackers can be specialised in (Supply – Outpost24)

These shells facilitate ongoing information pulls and function fallback entry factors if the preliminary vulnerability is patched.

By understanding Lionishackers’ automation-driven SQL injection workflow and their nimble alias rotation throughout boards, defenders can prioritize software firewall guidelines, improve question parameterization, and implement steady monitoring for anomalous database entry patterns.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Actors, Corporate, Dark, Databases, Exfiltrating, Lionishackers, Selling, Threat, Web

Post navigation

Previous Post: Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
Next Post: Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

Related Posts

Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution Cyber Security News
Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Cyber Security News
72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Days Cyber Security News
Google to Add New Layer of Developer Verification to Distribute Apps on Play Store Cyber Security News
SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month Cyber Security News
Top 10 Best Ransomware Protection Solutions In 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • FBI Shares IoCs for Recent Salesforce Intrusion Campaigns
  • LangChainGo Vulnerability Let Attackers Access Sensitive Files
  • West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach
  • Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • FBI Shares IoCs for Recent Salesforce Intrusion Campaigns
  • LangChainGo Vulnerability Let Attackers Access Sensitive Files
  • West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach
  • Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News