A threat actor claims to have breached Ícaro Cloud S.L., exposing firewall backups, VPN secrets, TLS certificates, administrator hashes, and plaintext password references from 20 client networks. The allegedly stolen data includes over 3,500 OPNsense configuration backups and is said to be for sale after being obtained through reused MSP credentials. #ÍcaroCloud #OPNsense #macaroni
Keypoints
- A threat actor claims to have breached Ícaro Cloud S.L. in Spain.
- The alleged leak affects 20 corporate networks and over 3,500 OPNsense configuration backups.
- Exposed data reportedly includes firewall backups, VPN keys, TLS certificates, and network segmentation details.
- Administrator hashes and plaintext password references are also said to be compromised.
- The actor claims the data came from reused MSP credentials and is being offered for sale underground.
DarkWebInformer.com Providing intel from some of the darkest places on the Dark Web & Clearnet. Breaches, Darknet Markets, Ransomware, Threat Alerts, & more!