Want to advertise? Learn more here! Prefer to subscribe with cryptocurrency? Subscribe here!

Skip to content Dark Web Informer - Cyber Threat Intelligence

💡 Subscribe to DarkWebInformer.com for Unmatched Cyber Threat Intelligence 💡

Why Subscribe? Let me do the work and save you time.

Stay ahead of cyber threats and safeguard your digital assets while enhancing your cybersecurity awareness with just some of these exclusive subscriber-only features:

  • 📜
    Exclusive Threat Feeds: Access the latest ransomware victim disclosures, breaches, leaks, and other critical updates. You will receive approximately 100-200 alerts daily.
  • 📡
    Detailed Threat Posts: Stay updated on breaches, leaks, ransomware, DDoS attacks, and more.
  • 📤
    On-Demand Data Export: Export all 14,000+ alerts to JSON, CSV, or XML at any time for deeper analysis.
  • 🖼️
    Instant Insight with Unredacted Screenshots: Gain immediate visibility into leaked data with high-resolution, watermark-free images. Seeing unredacted details helps you quickly assess whether your sensitive information has been compromised—without delays.
  • 🔗
    Direct Claim URLs: Instantly access claims with direct links for fast verification.
Subscribe Now Pay with Crypto

Disclaimer
This report includes actual screenshots and/or text containing unredacted cybersecurity intelligence gathered from publicly available sources. The information presented within this report is intended solely for cybersecurity awareness and threat intelligence purposes. Dark Web Informer explicitly condemns unauthorized access, distribution, or misuse of the compromised data. Users must treat exposed data responsibly and ethically.


📌 Overview

A threat actor operating under the alias l33tfg has posted a listing on a breach forum claiming to have scraped a large volume of data from NASA.gov. The actor does not claim a direct breach of internal systems but rather an extensive scraping of public-facing NASA infrastructure, including login portals and inactive subdomains.

The shared data reportedly includes emails, full names, usernames, MD5 password hashes, frontend source code, IP and DNS information, hidden directories, and login portals for internal systems. A public sample and full leak are hosted externally.


🔑 Key Details

AttributeInformation
📅 Date2025-03-25 04:09:53
🕵️‍♂️ Threat Actorl33tfg
🌎 Victim CountryUSA
🏭 Victim IndustryAviation & Aerospace
🏢 Victim OrganizationNASA
🌐 Victim Sitenasa.gov
📜 CategoryData Leak
🌍 NetworkOpen Web

This post is for subscribers on the Plus and Pro tiers

Subscribe

Already have an account? Sign In

Latest