Friday, March 29, 2024

46.2 Million Malaysian’s Personal Data Leaked Online – Largest Data Breach Ever in Malaysian History

Malaysian’s Biggest Data Breach Exposed around 46.2 Million Mobile phone numbers Data have been leaked online from Malaysian telecoms and mobile virtual network operators (MVNO).

The information that has got out includes postpaid and prepaid numbers, customer details, addresses, IMEI and IMSI numbers.

Exposed Data Including 17 million rows of customer information Candidate’s name, login name, hashed passwords, email id, nationality, address and handphone number from Jobstreet database.

720,000 entries indicate that Name, MyKad number, contact number, email address, blacklist status, address, job, employer details, salary and spouse’s details from housing loan applications.

Also Read : Homehack Glitch : Hackers found a way to spy through LG SmartThinQ

In this case Malaysia’s population is only around 32 million, but many have several mobile numbers and some of numbers are might be inactive and temporary.

Data Leaked time stamps indicate that leaked data was last updated between May and July 2014 between the various telecoms.

Earlier of This month on online forum and news site lowyat.net, which reported that some one was selling huge databases of personal details belonging to Malaysians.

Based on the dates in the data, we can safely say that the data breach took place sometime in 2014-2015 and Finally  lowyat.net Find the exact data the was exposed online.

Along with this Telecom Data Leaked, aslo leaked  3 databases belonging to the Malaysian Medical Council (MMC), the Malaysian Medical Association (MMA), as well as the Malaysian Dental Association (MDA).

Database
Total Records
Last Updated
   
Malaysian Medical Association (MMA)
15,965
05-02-2015
Malaysian Medical Council (MMC)
61,062
06-03-2015
Malaysian Dental Association (MDA)
4,282
25-01-2015
   
Total
81,309

This Sensitive Medical Record details around  81,309 records and time stamps show that it was last updated on 2015.

According to lowyat, The MCMC is following up with the relevant agencies to determine the source of the breach, but we now believe that the data was already being traded online much earlier then we first estimated. Based on the condition of the files that we obtained, we are quite certain that it has already changed hands more than once.

lowyat.net Founder Said, “The seller had created many new accounts, trying to sell the data. We had to continuously remove them. The accounts were created using many email addresses and new IP addresses”.

Lowyat Disclaimed that ,All data we recovered is currently encrypted and stored in a single location. We will be destroying all data that we have retrieved by Friday, 3 November at 12 pm. Data owners, please contact us should you require us to handover the data.

Some of Very Recent Data Leaked

  1. Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
  2.  Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online
  3.  Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails
  4. Leading research and advisory firms Forrester was hacked
  5. Disqus confirms it’s been hacked and more than 17.5 Million Users Details Exposed
  6. Gaming Service R6DB Database deleted By Hackers and held for Ransom
  7. Biggest Hack Ever – Each and Every Single Yahoo Account Was Hacked in 2013
  8. Pizza Hut Hacked – Users Reporting Fraudulent Transactions on their Cards
  9. Hyatt Hotels Data Breach Exposed 41 Hotel Customers Payment Card Information
  10. Verizon Wireless Confidential DataLeaked Accidentally by Its Employee
Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles