Skip to content Dark Web Informer - Cyber Threat Intelligence

Alleged sale of RDWeb access to an unidentified Australian government organization

📢 Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Get foundational access to breach intelligence — track breaches, leaks, and threats in real-time with unfiltered screenshots and expert summaries.

📚
4,000+ Blog Posts: Continuously updated with breach reports and threat summaries.
📢
15,000+ Alerts: Access detailed breach, leak, and DDoS alerts updated daily.
📤
Unredacted Threat Feed: Track breaches and leaks in real-time with JSON export support.
🔍
Leak & Breach Coverage: Get direct access to verified breach posts and claims.
📡
Snippets & Quick Facts: Receive concise summaries of DDoS, defacements, and breaches.
🤖
WhiteIntel.io API Access: Access an integrated API, in breach blog posts.
🖼️
High-Resolution Images: View uncompressed, watermark-free breach evidence.
🔑
Keyword Notifications: Receive browser alerts when monitored keywords are triggered.
📧
Custom Email Alerts: Get curated daily, weekly, or filtered alert summaries.
👥
Telegram Channels: Stay in the know with access to different Telegram channels.
📨
PGP Contact Details: Access verified PGPs for ransomware and threat groups.
⚠️
Coming Soon: CVE Alert Feed – Be first to know when new vulnerabilities emerge.

⚠ Disclaimer
This report may include actual screenshots and/or text containing unredacted personally identifiable information (PII) gathered from publicly available sources. The sensitive information presented within this report is intended solely for cybersecurity awareness and threat intelligence purposes. Dark Web Informer explicitly condemns unauthorized access, distribution, or misuse of the personal data displayed or referenced here. Users must treat exposed data responsibly and ethically.


📌 Overview
A threat actor using the alias gadji has listed for auction what is claimed to be RDWeb (Remote Desktop Web Access) access to an unidentified Australian government entity. The listing, posted on a well-known dark web exploit forum, claims the compromised organization has an annual revenue of $25.1 million and includes details about the Active Directory (AD) environment.

The listing is structured as an auction with a starting bid of $200, minimum increments of $100, and a blitz buyout option at $500.


Key Details

AttributeInformation
Date2025-05-28, 05:41:57 AM
Threat Actorgadji
Victim CountryAustralia
IndustryGovernment Administration
OrganizationUnidentified
Victim SiteNot listed
CategoryInitial Access
SeverityHigh
Networkopenweb

Subscriber-only content…

This post is for subscribers on the Plus and Pro tiers

Subscribe

Already have an account? Sign In

Latest