Data Exposure Wave Hits Insurance, Government; TheFallen Actor Active
Summary
Today's threat landscape is dominated by a high volume of alleged data exposure events, with a clear focus on the insurance and government sectors. The actor TheFallen is notably active, claiming multiple breaches against US-based financial and insurance entities. Concurrently, industry reporting highlights active exploitation of a critical cPanel vulnerability and sophisticated supply chain attacks targeting SAP and npm ecosystems, signaling a need for immediate patching and dependency review.
Today's developments
The most significant signal today is the concentrated activity of the actor TheFallen, who claims to have breached multiple US entities. These alleged incidents include a large-scale compromise of a multi-line insurance provider, a finance/REIT and ETF investor database, and a luxury fragrance retailer. The scope of these claims, if verified, suggests a targeted campaign against high-value financial and consumer data in the United States. Separately, actor MDGhost claims to have breached an Israeli insurance firm and a US-based insurance aggregator, further underscoring the insurance sector as a prime target.
- TheFallen alleges breaches of US entities including a multi-line insurance client database, a finance/REIT investor list, an art collector/donor database, and a luxury goods retailer.
- MDGhost claims breaches of an Israeli insurance organization and a US car insurance website.
- GordonFreeman claims to have breached a Venezuelan telecommunications provider and two Guatemalan government agencies (National Registry of Persons and the Superintendency of Tax Administration).
- 0xHentai and Mr. Hanz Xploit are responsible for multiple alleged breaches against Indonesian government and educational institutions, including a university, a district court, and a city transportation agency.
Industry analysis from today provides critical context. Security researchers have identified a critical authentication vulnerability in cPanel that is being actively exploited, urging immediate patching of all supported versions. A separate report details a supply chain attack campaign targeting SAP-related npm packages with credential-stealing malware, attributed to a campaign dubbed "mini Shai-Hulud." Researchers also note a new wave of attacks from DPRK-linked actors using AI-inserted npm malware and fake companies to deploy remote access trojans (RATs). Finally, the Checkmarx supply chain attack has been confirmed to have resulted in data exfiltration from their GitHub environment, a week after malicious code was published.
Threat landscape signals
The day's events reveal several actionable patterns. First, the United States is the top victim country, driven heavily by TheFallen's alleged financial sector targeting. Indonesia is the second most targeted country, with a high volume of low-sophistication breaches against government and education institutions by local actors. The concentration of activity by DieNet (27 events) and Keymous Plus (15 events) suggests these groups are running sustained, possibly automated, campaigns.
From a defensive perspective, the convergence of supply chain attacks (npm, SAP, Checkmarx) and the active exploitation of a critical infrastructure component (cPanel) demands immediate attention. The LiteLLM vulnerability being exploited shortly after disclosure is a reminder of the shrinking window for patching. The report of 38 vulnerabilities in OpenEMR medical software also highlights persistent risks in healthcare technology. Defenders should prioritize patching cPanel, auditing npm dependencies for SAP-related packages, and reviewing exposure management platforms to keep pace with AI-driven attack automation.
CTI brief — 29 April 2026
The full brief covers ransomware claims, data leaks and threat actors disclosed on this date. Today's brief is open to all readers; historical editions are part of the subscriber feed.