Saturday, March 8, 2025
HomeCyber Security NewsINDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

Published on

SIEM as a Service

Follow Us on Google News

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of Health.

The group announced their claim via a post on a hacking forum, stirring fears over the safety of sensitive health data in the country.

The cyberattack came to light after INDOHAXSEC boasted about the breach on social media and hacking platforms.

The NTBR contains highly sensitive information, including personal health records of individuals diagnosed with tuberculosis, a disease still prevalent in Malaysia.

If the hacking group’s claims are verified, this breach could have significant repercussions for patient privacy, public health efforts, and national security.

The Alleged Breach

Reports indicate that INDOHAXSEC has provided no concrete proof of the extent of the breach, but the group claims to have accessed a significant amount of confidential data.

The hackers allege that the stolen information includes names, identification numbers, medical records, and treatment details of patients registered in the NTBR.

This incident, if confirmed, would represent a serious lapse in cybersecurity, raising questions about the vulnerability of Malaysia’s public databases.

Cyber experts have pointed out that national health registries are typically high-value targets for hackers due to the sensitivity of the data they store.

INDOHAXSEC, a relatively new but increasingly notorious hacking group in Southeast Asia, has a track record of targeting government systems and databases.

Their motivations, however, remain unclear, as they have yet to disclose whether the attack was politically or financially driven.

Malaysia’s Ministry of Health has not officially confirmed the breach. Authorities have stated that they are conducting an investigation into the matter and working with cybersecurity agencies to assess the situation.

An official spokesperson urged the public to remain calm while the claims are verified. Cybersecurity experts have warned that if the data is leaked or sold on the dark web, it could lead to identity theft, stigmatization of patients, and disruption of critical public health programs.

This alleged breach underscores the urgent need for stronger cybersecurity frameworks within government agencies.

With cyberattacks becoming increasingly sophisticated, robust safeguards, regular audits, and rapid response protocols are crucial to protect sensitive data.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...