Sunday, February 9, 2025
HomeCyber Security NewsINDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

Published on

SIEM as a Service

Follow Us on Google News

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of Health.

The group announced their claim via a post on a hacking forum, stirring fears over the safety of sensitive health data in the country.

The cyberattack came to light after INDOHAXSEC boasted about the breach on social media and hacking platforms.

The NTBR contains highly sensitive information, including personal health records of individuals diagnosed with tuberculosis, a disease still prevalent in Malaysia.

If the hacking group’s claims are verified, this breach could have significant repercussions for patient privacy, public health efforts, and national security.

The Alleged Breach

Reports indicate that INDOHAXSEC has provided no concrete proof of the extent of the breach, but the group claims to have accessed a significant amount of confidential data.

The hackers allege that the stolen information includes names, identification numbers, medical records, and treatment details of patients registered in the NTBR.

This incident, if confirmed, would represent a serious lapse in cybersecurity, raising questions about the vulnerability of Malaysia’s public databases.

Cyber experts have pointed out that national health registries are typically high-value targets for hackers due to the sensitivity of the data they store.

INDOHAXSEC, a relatively new but increasingly notorious hacking group in Southeast Asia, has a track record of targeting government systems and databases.

Their motivations, however, remain unclear, as they have yet to disclose whether the attack was politically or financially driven.

Malaysia’s Ministry of Health has not officially confirmed the breach. Authorities have stated that they are conducting an investigation into the matter and working with cybersecurity agencies to assess the situation.

An official spokesperson urged the public to remain calm while the claims are verified. Cybersecurity experts have warned that if the data is leaked or sold on the dark web, it could lead to identity theft, stigmatization of patients, and disruption of critical public health programs.

This alleged breach underscores the urgent need for stronger cybersecurity frameworks within government agencies.

With cyberattacks becoming increasingly sophisticated, robust safeguards, regular audits, and rapid response protocols are crucial to protect sensitive data.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...