Skip to content Dark Web Informer - Cyber Threat Intelligence

Alleged Data Breach of Hotel Ca’ dei Conti in Venice, Italy

📢 Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Get foundational access to breach intelligence — track breaches, leaks, and threats in real-time with unfiltered screenshots and expert summaries.

📚
4,000+ Blog Posts: Continuously updated with breach reports and threat summaries.
📢
26,000+ Alerts: Access detailed breach, leak, and DDoS alerts updated daily.
📤
Unredacted Threat Feed: Track breaches and leaks in real-time with JSON export support.
🔍
Leak & Breach Coverage: Get direct access to breach posts and claims.
📡
Snippets & Quick Facts: Receive concise summaries of DDoS, defacements, and breaches.
🌐
Access 500+ Onion and Clearnet Resources: Gain verified access to a growing index of dark web sites and services.
📊
Real-Time Uptime Dashboard: Monitor live status of 500+ dark web and clearnet sites.
🤖
WhiteIntel.io API Access: Access an integrated API, in breach blog posts.
🖼️
High-Resolution Images: View uncompressed, watermark-free breach evidence.
🔑
Keyword Notifications: Receive browser alerts when monitored keywords are triggered.
👥
Telegram Channels: Stay in the know with access to different Telegram channels.
📨
PGP Contact Details: Access verified PGPs for ransomware and threat groups.

A threat actor using the alias mydocs is claiming to sell a massive dataset allegedly extracted from Hotel Ca’ dei Conti, a 4-star boutique hotel located in Venice, Italy. According to the listing, the dataset includes over 38,000 high-resolution scanned images of guest IDs and passports, obtained through unauthorized access in July 2025.

📸 Note: Select screenshots are shown in this post.
Full claim URLs and high-resolution, unredacted screenshots are available exclusively via the private threat feeds for paid subscribers.
👉 Subscribe

🧾 Key Details

FieldInformation
Victim CountryItaly 🇮🇹
IndustryHospitality & Tourism
VictimHotel Ca’ dei Conti
Websitecadeiconti.com
CategoryData Breach
SeverityMedium
Threat Actormydocs
NetworkOpen Web
Claim URLFor Paid Subscribers

🏨 Breach Overview

The actor claims the data was collected through the hotel’s KYC (Know Your Customer) check-in process. These files are organized by country of origin and provided in JPG format.

📂 Dataset Contents:

  • 38,000+ scanned images of passports and national IDs
  • Collected during hotel check-in procedures
  • Files are high resolution, clear, and fully legible
  • Allegedly ideal for identity fraud or synthetic identity creation
  • Covers guests from Spain, France, Italy, and other nations

💸 Sale Information

FieldDetails
Price20,000$ (Negotiable)
ContactTelegram: Redacted

📸 Screenshot Previews

Unredacted screenshots and full image set are available to paid subscribers.


🧰 TTPs (MITRE Mapping)

TacticTechnique IDTechnique Name
Initial AccessT1078Valid Accounts or Exploit Public-Facing Application
CollectionT1119Automated Collection
ExfiltrationT1041Exfiltration Over C2 Channel
ImpactT1530Data from Information Repositories

Note: TTPs inferred based on the described access method and nature of the data.


🧠 Final Thoughts

This incident highlights the widespread risk that hospitality providers face when storing sensitive guest identification documents. The volume, resolution, and clarity of the exposed data present a significant threat not only to individuals whose documents were stolen but also to financial institutions and KYC-dependent services globally.

Latest