Skip to content Dark Web Informer - Cyber Threat Intelligence

Initial Access Listings: Alleged Compromises in Taiwan, U.S., and Paraguay

📢 Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Get foundational access to breach intelligence — track breaches, leaks, and threats in real-time with unfiltered screenshots and expert summaries.

📚
4,000+ Blog Posts: Continuously updated with breach reports and threat summaries.
📢
26,000+ Alerts: Access detailed breach, leak, and DDoS alerts updated daily.
📤
Unredacted Threat Feed: Track breaches and leaks in real-time with JSON export support.
🔍
Leak & Breach Coverage: Get direct access to breach posts and claims.
📡
Snippets & Quick Facts: Receive concise summaries of DDoS, defacements, and breaches.
🌐
Access 500+ Onion and Clearnet Resources: Gain verified access to a growing index of dark web sites and services.
📊
Real-Time Uptime Dashboard: Monitor live status of 500+ dark web and clearnet sites.
🤖
WhiteIntel.io API Access: Access an integrated API, in breach blog posts.
🖼️
High-Resolution Images: View uncompressed, watermark-free breach evidence.
🔑
Keyword Notifications: Receive browser alerts when monitored keywords are triggered.
👥
Telegram Channels: Stay in the know with access to different Telegram channels.
📨
PGP Contact Details: Access verified PGPs for ransomware and threat groups.

Posted on a well-known hacking forum, a threat actor using the alias "Saturned33" has listed alleged access for sale to multiple corporate and government networks across three countries. The listings include domain and local admin access to organizations in the electronics, automotive, and transportation sectors.


🧾 Key Details

CountrySectorAccess TypePrivilegesHostsRevenuePrice
🇹🇼 TaiwanElectronicsRDPDomain Admin80+$18M+$1300
🇺🇸 USAManufacturing (car components)SHELLLocal Admin50+$17.5M+$1200
🇵🇾 ParaguayGovernment (Transport)SHELLLocal Admin$13M+$500

📌 Notable Claims from the Listings

🇹🇼 Taiwan – Electronics Firm

  • Revenue: $18M+
  • Access: RDP with Domain Admin privileges
  • Hosts: 80+
  • AV: HUORONG (manually deactivatable)
  • Tags: Public client download page for software, drivers, and firmware—may allow malicious file binding

🇺🇸 USA – Automotive Manufacturing

  • Revenue: $17.5M+
  • Access: Shell access with Local Admin privileges
  • Hosts: 50+
  • Language of host system: Chinese
  • Note: Seller mentions this business is in the U.S. but hosted in China

🇵🇾 Paraguay – Government Transport Sector

  • Revenue: $13M+
  • Access: Shell with Local Admin privileges
  • Note: Labeled under the government sector

🕵️ Threat Actor Profile

  • Alias: Saturned33
  • Forum Activity: Recently registered (1 post, 0 reputation)
  • Deposit: 0.002434 BTC
  • Autogarant: 0 (none used in this listing)
  • Language Tags: Russian ("хакинг / hacking")

🔐 Claim URLs

📸 Note: Select screenshots are shown in this post. Full claim URLs and high-resolution, unredacted screenshots are available exclusively via the private threat feeds for paid subscribers.

🧠 Stay informed with verified threat intelligence:
👉 darkwebinformer.com/tag/subscribers

💭 Final Thoughts

Access listings like these highlight persistent risks across critical sectors, including manufacturing and government. The use of public-facing download pages, misconfigured permissions, and compromised admin accounts represent substantial footholds for attackers seeking to exfiltrate data or launch ransomware attacks.

Organizations must continue to monitor for unauthorized remote access points, especially where operations intersect across international infrastructure or cloud providers.

Latest