Dark Web Informer 

2K Followers
0 Following
9.2K Posts

I am currently only posting on X and Discord as of 2026/02/13. Visit my socials below!

Website: https://darkwebinformer.com/

Website Pricing (Includes Crypto): https://darkwebinformer.com/pricing

Socials: https://darkwebinformer.com/socials

API Access: https://darkwebinformer.com/api-details

Donations: https://darkwebinformer.com/donations

Advertise (Only Legitimate Companies): https://darkwebinformer.com/advertising

About Dark Web Informer: https://darkwebinformer.com/about-dark-web-informer

Updated: 2026-02-13

Dark Web Informerhttps://darkwebinformer.com
X/Twitterhttps://www.x.com/DarkWebInformer
Mediumhttps://medium.com/@DarkWebInformer
GitHubhttps://github.com/DarkWebInformer

I am no longer posting on Infosec Exchange or Telegram. Infosec Exchange was never really for me, and Telegram has become difficult to manage with six channels.

It’s more manageable to focus on just two platforms (X and Discord) instead of having to follow up on 4. It also makes things easier not having to copy and paste content across multiple socials.

I will still be hiding on Telegram, just not posting. I also do not have a username there.

Other than that, everything else remains the same when it comes to seeing posts on social media.

darkwebinformer.com/socials

Daily Dose of Dark Web Informer - February 12th, 2026

https://darkwebinformer.com/daily-dose-of-dark-web-informer-february-12th-2026/

Daily Dose of Dark Web Informer - February 12th, 2026

This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.

Dark Web Informer
Threat Attack Update - February 12th, 2026

Threat Attack Update - February 12th, 2026

Dark Web Informer

‼️🇺🇸 A threat actor is selling an alleged critical severity OpenSea 0-day exploit chain for $100,000 USD (BTC/XMR).

The threat actor claims the exploit affects OpenSea's Seaport order validation logic on Ethereum Main Net, Polygon, and Blast, enabling forced transfer of high-value NFTs at 0 ETH, bypassing listing approvals, and working on both active and inactive listings.

The seller claims the vulnerability is unpatched and undisclosed.

Ransomware Attack Update - February 12th, 2026

Ransomware Attack Update - February 12th, 2026

Dark Web Informer

‼️ CISA added one more vulnerability to the KEV Catalog today...

CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability: SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

‼️New Forum: TierOne a/k/a T1erOne

jprrin6bqe3flvtpyxkt4zsmzc3u6vvn7ahgtcbul224w3xn4h3gawid[.]onion

t1eron3[.]vip

Credit: @club31337

💥 Ransomware Decryptor Database: A free searchable database of 150+ ransomware decryption tools.

Search by name, file extension, or vendor. Mostly sourced from the No More Ransom Project.

https://darkwebinformer.com/ransomware-decryptor-database/

Source links go to the vendor's decryptor page, not direct downloads.

If you know of a link to a guide/decryptor source that isn't listed/missing. Let me know and I will verify and add it.

Ransomware Decryptor Database — Free Decryption Tools for 150+ Ransomware Families

Search 150+ free ransomware decryption tools from the No More Ransom Project. Find decryptors by ransomware name, file extension, or vendor. Covers GandCrab, REvil, LockBit, STOP/Djvu, WannaCry, Darkside, and more.

Dark Web Informer

‼️ Odido Telecom Says Customer Data Compromised in Cyberattack

The breach involves personal data from a customer contact system used by Odido.

Approximately 6.2 million accounts are said to be affected. The intrusion was discovered several days ago.

The following data was exposed according to Obido:

▪️Full name
▪️Address and city of residence
▪️Mobile number
▪️Customer number
▪️Email address
▪️IBAN (bank account number)
▪️Date of birth
▪️Identification details (passport or driver's license number and expiration date)