Sunday, July 21, 2024

46.2 Million Malaysian’s Personal Data Leaked Online – Largest Data Breach Ever in Malaysian History

Malaysian’s Biggest Data Breach Exposed around 46.2 Million Mobile phone numbers Data have been leaked online from Malaysian telecoms and mobile virtual network operators (MVNO).

The information that has got out includes postpaid and prepaid numbers, customer details, addresses, IMEI and IMSI numbers.

Exposed Data Including 17 million rows of customer information Candidate’s name, login name, hashed passwords, email id, nationality, address and handphone number from Jobstreet database.

720,000 entries indicate that Name, MyKad number, contact number, email address, blacklist status, address, job, employer details, salary and spouse’s details from housing loan applications.

Also Read : Homehack Glitch : Hackers found a way to spy through LG SmartThinQ

In this case Malaysia’s population is only around 32 million, but many have several mobile numbers and some of numbers are might be inactive and temporary.

Data Leaked time stamps indicate that leaked data was last updated between May and July 2014 between the various telecoms.

Earlier of This month on online forum and news site, which reported that some one was selling huge databases of personal details belonging to Malaysians.

Based on the dates in the data, we can safely say that the data breach took place sometime in 2014-2015 and Finally Find the exact data the was exposed online.

Along with this Telecom Data Leaked, aslo leaked  3 databases belonging to the Malaysian Medical Council (MMC), the Malaysian Medical Association (MMA), as well as the Malaysian Dental Association (MDA).

Total Records
Last Updated
Malaysian Medical Association (MMA)
Malaysian Medical Council (MMC)
Malaysian Dental Association (MDA)

This Sensitive Medical Record details around  81,309 records and time stamps show that it was last updated on 2015.

According to lowyat, The MCMC is following up with the relevant agencies to determine the source of the breach, but we now believe that the data was already being traded online much earlier then we first estimated. Based on the condition of the files that we obtained, we are quite certain that it has already changed hands more than once. Founder Said, “The seller had created many new accounts, trying to sell the data. We had to continuously remove them. The accounts were created using many email addresses and new IP addresses”.

Lowyat Disclaimed that ,All data we recovered is currently encrypted and stored in a single location. We will be destroying all data that we have retrieved by Friday, 3 November at 12 pm. Data owners, please contact us should you require us to handover the data.

Some of Very Recent Data Leaked

  1. Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
  2.  Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online
  3.  Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails
  4. Leading research and advisory firms Forrester was hacked
  5. Disqus confirms it’s been hacked and more than 17.5 Million Users Details Exposed
  6. Gaming Service R6DB Database deleted By Hackers and held for Ransom
  7. Biggest Hack Ever – Each and Every Single Yahoo Account Was Hacked in 2013
  8. Pizza Hut Hacked – Users Reporting Fraudulent Transactions on their Cards
  9. Hyatt Hotels Data Breach Exposed 41 Hotel Customers Payment Card Information
  10. Verizon Wireless Confidential DataLeaked Accidentally by Its Employee

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles