Sunday, April 13, 2025
HomeCyber Security NewsINDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

Published on

SIEM as a Service

Follow Us on Google News

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of Health.

The group announced their claim via a post on a hacking forum, stirring fears over the safety of sensitive health data in the country.

The cyberattack came to light after INDOHAXSEC boasted about the breach on social media and hacking platforms.

- Advertisement - Google News

The NTBR contains highly sensitive information, including personal health records of individuals diagnosed with tuberculosis, a disease still prevalent in Malaysia.

If the hacking group’s claims are verified, this breach could have significant repercussions for patient privacy, public health efforts, and national security.

The Alleged Breach

Reports indicate that INDOHAXSEC has provided no concrete proof of the extent of the breach, but the group claims to have accessed a significant amount of confidential data.

The hackers allege that the stolen information includes names, identification numbers, medical records, and treatment details of patients registered in the NTBR.

This incident, if confirmed, would represent a serious lapse in cybersecurity, raising questions about the vulnerability of Malaysia’s public databases.

Cyber experts have pointed out that national health registries are typically high-value targets for hackers due to the sensitivity of the data they store.

INDOHAXSEC, a relatively new but increasingly notorious hacking group in Southeast Asia, has a track record of targeting government systems and databases.

Their motivations, however, remain unclear, as they have yet to disclose whether the attack was politically or financially driven.

Malaysia’s Ministry of Health has not officially confirmed the breach. Authorities have stated that they are conducting an investigation into the matter and working with cybersecurity agencies to assess the situation.

An official spokesperson urged the public to remain calm while the claims are verified. Cybersecurity experts have warned that if the data is leaked or sold on the dark web, it could lead to identity theft, stigmatization of patients, and disruption of critical public health programs.

This alleged breach underscores the urgent need for stronger cybersecurity frameworks within government agencies.

With cyberattacks becoming increasingly sophisticated, robust safeguards, regular audits, and rapid response protocols are crucial to protect sensitive data.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...