I may have to add Moldova to my list of countries I may not be able to visit. I just posted a two-fer involving two of their government portals:

https://databreaches.net/2026/02/19/data-protection-failures-on-moldovan-portals-exposed-citizens-to-risk/ is about a long-time IDOR incident that exposed the personal info of everyone who ever used the govt portal to apply for a job. The vulnerability was brought to my attention by a student who was frustrated with his government's lack of response to his attempts to get them to address it.

and

https://databreaches.net/2026/02/19/leaked-data-raises-questions-about-hackers-claims-and-moldovas-prior-denial/ discusses an alleged hack by Bashe Team of another portal used by Moldovan residents to apply for energy compensation.

In May 2025, the government had denied claims that access to the compensation portal had been sold. "No evidence.... smoke and mirrors... " they claimed.

Fast forward to January 2026, and data from that portal and timeframe was leaked after Bashe Team claimed to have hacked it. But while the data appear to be real, Bashe Team's claims about how and when they acquired it didn't check out.

Bashe Team seems to be allergic to telling the truth about their listings. @cloudsek noted their less-than-honest claims in 2025; DataBreaches.net notes it now, and @amvinfe has also noted it in his new reporting on #SuspectFile.

#databreach #leak #vulnerability #cariere #compensatii #govsec #cybersecurity #Bashe #APT73 #Eraleign

@campuscodi @euroinfosec @lawrenceabrams

Data Protection Failures on Moldovan Portals Leave Citizens at Risk - DataBreaches.Net

Breaches involving government entities may be politically motivated, such as the 2022 compromise of the Presidency of Moldova's email server or the 2024 comprom

DataBreaches.Net

๐ƒ๐จ๐ฎ๐›๐ญ๐ฌ ๐Ž๐ฏ๐ž๐ซ ๐๐š๐ฌ๐ก๐žโ€™๐ฌ ๐‚๐ฅ๐š๐ข๐ฆ๐ฌ: ๐“๐ž๐œ๐ก๐ง๐ข๐œ๐š๐ฅ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ ๐š๐ง๐ ๐Ž๐ฉ๐ž๐ง ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ

What emerged from this follow-up inquiry highlights significant discrepancies between the statements published on the groupโ€™s blog and the technical characteristics of the data examined. Despite our additional questions, no verifiable evidence was provided to substantiate the claims. Instead, we were told that authenticity could be confirmed through the purchase of the stolen database โ€” a proposal we firmly rejected.

https://www.suspectfile.com/doubts-over-bashes-claims-technical-analysis-and-open-questions/

#APT73 #Bashe #CloudSEK #IndianBank #IndonesianBank #LineBank #Ransomware

๐Ÿ“ข Bashe (APT73), un nouvel acteur รฉmergent du RaaS
๐Ÿ“ # Bashe (ex-APT73) โ€“ Profil dโ€™un acteur RaaS รฉmergent

**Source :** SuspectFile โ€“ *Inside Bashe: The Interview with the Ransomware Group Known as APT73*
https://www.suspectfile.com/ins...
๐Ÿ“– cyberveille : https://cyberveille.ch/posts/2026-02-16-bashe-apt73-un-nouvel-acteur-emergent-du-raas/
๐ŸŒ source : https://www.suspectfile.com/inside-bashe-the-interview-with-the-ransomware-group-known-as-apt73/
#APT73 #Bashe #Cyberveille

๐ˆ๐ง๐ฌ๐ข๐๐ž ๐๐š๐ฌ๐ก๐ž: ๐“๐ก๐ž ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐ญ๐ก๐ž ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐†๐ซ๐จ๐ฎ๐ฉ ๐Š๐ง๐จ๐ฐ๐ง ๐š๐ฌ ๐€๐๐“๐Ÿ•๐Ÿ‘

#Bashe operates according to a structured hashtag#RaaS model, maintaining central control over the negotiation platform and the publication of exfiltrated data. From their statements, a centralized governance emerges: although they publicly define themselves as โ€œTeam Basheโ€ without an identifiable leadership, the group claims to act as a โ€œsingle core,โ€ maintaining full control over communication panels and affiliate activities...

https://www.suspectfile.com/inside-bashe-the-interview-with-the-ransomware-group-known-as-apt73/

#APT73 #Bashe #Interview #Ransomware

#Paraguay๐Ÿ‡ต๐Ÿ‡พ : Update Nยฐ3

Since the denial of the cyber-attack by the Financiera, the bashe group has published 3 parts of the Paraguayan-Japanese Financiera.

https://blog.security-chu.com/2024/12/actualizacion-n3-desde-la-negacion-del.html

#infosec #cyberattack #databreach #breach #py #ransomware #bashe #apt73 #incidentresponse #news

Actualizaciรณn Nยฐ3: Desde la negaciรณn del ciberataque por la Financiera, el grupo bashe ha publicado 3 partes de la Financiera Paraguayo Japonesa

El 29 de noviembre, la Financiera Paraguayo Japonesa fue publicada en la darkweb por el grupo de ransomware bashe pidiendo un rescate.