Saturday, March 1, 2025
HomeData Breach46.2 Million Malaysian's Personal Data Leaked Online - Largest Data Breach Ever...

46.2 Million Malaysian’s Personal Data Leaked Online – Largest Data Breach Ever in Malaysian History

Published on

SIEM as a Service

Follow Us on Google News

Malaysian’s Biggest Data Breach Exposed around 46.2 Million Mobile phone numbers Data have been leaked online from Malaysian telecoms and mobile virtual network operators (MVNO).

The information that has got out includes postpaid and prepaid numbers, customer details, addresses, IMEI and IMSI numbers.

Exposed Data Including 17 million rows of customer information Candidate’s name, login name, hashed passwords, email id, nationality, address and handphone number from Jobstreet database.

720,000 entries indicate that Name, MyKad number, contact number, email address, blacklist status, address, job, employer details, salary and spouse’s details from housing loan applications.

Also Read : Homehack Glitch : Hackers found a way to spy through LG SmartThinQ

In this case Malaysia’s population is only around 32 million, but many have several mobile numbers and some of numbers are might be inactive and temporary.

Data Leaked time stamps indicate that leaked data was last updated between May and July 2014 between the various telecoms.

Earlier of This month on online forum and news site lowyat.net, which reported that some one was selling huge databases of personal details belonging to Malaysians.

Based on the dates in the data, we can safely say that the data breach took place sometime in 2014-2015 and Finally  lowyat.net Find the exact data the was exposed online.

Along with this Telecom Data Leaked, aslo leaked  3 databases belonging to the Malaysian Medical Council (MMC), the Malaysian Medical Association (MMA), as well as the Malaysian Dental Association (MDA).

Database
Total Records
Last Updated
   
Malaysian Medical Association (MMA)
15,965
05-02-2015
Malaysian Medical Council (MMC)
61,062
06-03-2015
Malaysian Dental Association (MDA)
4,282
25-01-2015
   
Total
81,309

This Sensitive Medical Record details around  81,309 records and time stamps show that it was last updated on 2015.

According to lowyat, The MCMC is following up with the relevant agencies to determine the source of the breach, but we now believe that the data was already being traded online much earlier then we first estimated. Based on the condition of the files that we obtained, we are quite certain that it has already changed hands more than once.

lowyat.net Founder Said, “The seller had created many new accounts, trying to sell the data. We had to continuously remove them. The accounts were created using many email addresses and new IP addresses”.

Lowyat Disclaimed that ,All data we recovered is currently encrypted and stored in a single location. We will be destroying all data that we have retrieved by Friday, 3 November at 12 pm. Data owners, please contact us should you require us to handover the data.

Some of Very Recent Data Leaked

  1. Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
  2.  Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online
  3.  Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails
  4. Leading research and advisory firms Forrester was hacked
  5. Disqus confirms it’s been hacked and more than 17.5 Million Users Details Exposed
  6. Gaming Service R6DB Database deleted By Hackers and held for Ransom
  7. Biggest Hack Ever – Each and Every Single Yahoo Account Was Hacked in 2013
  8. Pizza Hut Hacked – Users Reporting Fraudulent Transactions on their Cards
  9. Hyatt Hotels Data Breach Exposed 41 Hotel Customers Payment Card Information
  10. Verizon Wireless Confidential DataLeaked Accidentally by Its Employee
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...