Skip to content

Saudi Arabia Government Postal System Domain Controller Access Allegedly For Sale

Dark Web Informer - Cyber Threat Intelligence

Saudi Arabia Government Postal System Domain Controller Access Allegedly For Sale

Saudi Arabia
Government Administration

🧩 Standalone API Access Now Available

Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more – independently from the above standard subscriptions.

View API Access

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)
Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)
Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat Feed
Live tracking with JSON export.
🔍
Leak and Breach Coverage
Direct access to claims and posts.
📡
Snippets and Quick Facts
Concise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet Resources
Verified index of dark web sites and services.
📊
Real Time Uptime Dashboard
Live status of 500+ sites.
🤖
WhiteIntel.io API
Integrated checks inside breach posts.
🖼️
High Resolution Images
Uncompressed, watermark free evidence.
🔑
Keyword Notifications
Browser alerts for tracked terms.

Quick Facts

Date and Time of Alert
2026-01-14 01:21:47 UTC
Threat Actor
miya
Victim Country
Saudi Arabia
Industry
Government Administration
Victim Org.
Saudi Arabia Government Postal System
Victim Site
Not Disclosed
Category
Initial Access
Severity
High
Network
Clear Web

Incident Overview

An initial access broker operating under the handle "miya" claims to be selling unauthorized access to the Saudi Arabia Government Postal System Domain Controller. According to the advertisement posted on BreachForums, the threat actor is offering access to a firewall device with root-level Remote Code Execution capabilities, shell access, and firewall administrator permissions. The claimed access includes unknown revenue potential for the compromised system.

The threat actor has set the price at $400 USD and explicitly states the offer is non-negotiable, intended for serious buyers only. The listing includes a session ID for potential buyers to verify the access. The seller emphasizes they are not affiliated with any group, do not commit illicit activity, and are offering this access without commission work. Interested parties are instructed to contact the threat actor via their session for additional details.

This post is for subscribers on the Plus, Pro and Elite tiers

Subscribe

Already have an account? Sign In

Latest