Attribution: Unknown, financially motivated cybercriminal group
First Observed: 2025
Primary Operations: Data exfiltration, cloud data exposure, source code leaks, public dataset releases
FulcrumSec is an emerging cybercrime group focused on large-scale data exfiltration and public exposure campaigns. Active since at least late 2025, the group has developed a distinct operational identity centered on publishing stolen data, highlighting alleged security failures, and framing breaches as evidence of systemic negligence.
Unlike traditional ransomware groups, FulcrumSec places heavy emphasis on narrative, branding, and public-facing campaigns, often organizing victims into themed leak operations.
Structured leak campaigns and branding strategy
FulcrumSec operates multiple named campaigns that group victims together under specific narratives. These campaigns appear designed to amplify reputational damage while reinforcing the group’s positioning as exposing widespread security failures.
Observed campaigns include:
- Index of Shame: A campaign focused on organizations allegedly exposing sensitive data through publicly accessible directories and misconfigured infrastructure
- The Hardcoded Horror Show: A campaign highlighting organizations that allegedly exposed credentials, API keys, and secrets within source code or application builds
- Slopocalypse Now: A developing campaign targeting AI platforms and companies handling large volumes of sensitive user data
These campaign names, along with accompanying messaging, indicate an intentional effort to frame breaches as part of broader systemic issues rather than isolated incidents.
Victim listings published by FulcrumSec
The group’s website includes a consolidated listing of organizations allegedly impacted across its campaigns. Known listed entities include:
- Stuf Storage
- Hatica
- Analog / Analog Gold
- ReFocus AI
- MyComplianceOffice (MCO)
- LexisNexis (alleged)
- youX
- Woundtech
- Lena Health
- Raptor Supplies
- Avnet
- Fashinza
- CrediElite
- Rotary
- IMEVI
- Interzero
- SalesKido
- ParkEngage
- Nordstern Technologies / NCS
Some of these listings correspond to previously reported breach claims, while others appear as part of broader campaign rollups with limited supporting detail.
Links to BreachNews coverage
FulcrumSec activity has been covered across multiple incidents:
- MyComplianceOffice dataset release following failed negotiations
- Hatica breach exposing Slack workspaces and credentials
- Mining intelligence platform breach tied to government-linked data exposure
- Stuf Storage breach involving 287GB of data and physical access logs
These incidents demonstrate a consistent pattern of large dataset exposure and public release.
Technical focus: cloud, credentials, and exposed infrastructure
FulcrumSec repeatedly references access to cloud storage environments, particularly AWS S3, as well as exposed backend systems and SaaS platforms.
The group’s messaging and published materials suggest a focus on:
- Misconfigured cloud storage and open directories
- Exposed API keys and credentials in source code
- Publicly accessible internal systems and datasets
- Improperly secured application infrastructure
This aligns with broader trends in cybercrime where attackers target centralized data repositories to maximize extraction volume.
Data exposure and publication model
FulcrumSec frequently claims to exfiltrate large datasets including customer records, internal communications, source code, access logs, and operational data.
In several cases, the group has published data directly or offered bulk downloads, sometimes withholding select sensitive elements while releasing the majority of the dataset.
This approach reduces reliance on prolonged negotiations and increases immediate pressure on victims through public exposure.
Messaging and positioning
The group’s public communications frame its activity as exposing negligence rather than purely criminal activity. Messaging often emphasizes that organizations failed to implement basic security controls, leaving sensitive data accessible.
This narrative-driven approach, combined with structured campaigns and curated victim lists, suggests an attempt to build a recognizable identity within the cybercrime ecosystem.
Emerging threat assessment
FulcrumSec remains a developing threat actor but shows signs of increasing organization and consistency. Its combination of data exfiltration, public release strategies, and campaign branding differentiates it from more traditional ransomware or extortion groups.
While many claims remain unverified, the scale and frequency of activity indicate that FulcrumSec is an actor worth monitoring, particularly for organizations relying on cloud infrastructure and SaaS platforms.
Notes
All breach claims attributed to FulcrumSec should be treated as unverified unless confirmed by affected organizations or independently validated. However, the group’s pattern of publishing datasets following claims suggests that its activity may present real risk across multiple sectors.












