Monday, March 31, 2025
HomeCyber AttackKuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Published on

SIEM as a Service

Follow Us on Google News

Kuala Lumpur International Airport (KLIA), one of Southeast Asia’s busiest airports, was hit by a major cyberattack over the weekend.

The incident, which paralyzed some operations, has raised significant concerns about the airport’s cybersecurity and the safety of travelers. Hackers behind the attack demanded a substantial ransom of US$10 million to restore normalcy.

Official Response

Malaysian Prime Minister Anwar Ibrahim confirmed the cyberattack, revealing that Malaysia Airports Holdings Berhad (MAHB), the entity responsible for operating the country’s airports, had been severely affected.

Anwar emphasized his firm stance against paying the ransom, stating, “There is no way this country will be safe if its leaders and system allow us to bow to ultimatums by criminals and traitors, be it from inside or outside the country.”

Anwar’s swift and uncompromising response underscores the government’s commitment to combating cybercrime and avoiding the precedent of negotiating with hackers.

In his speech, he mentioned, “When I was informed about this … I did not wait five seconds. I said no.” This stance suggests that the government is prioritizing long-term security over immediate resolution.

Impact on Operations

Although some operations were disrupted, it was not immediately clear if the cyberattack had been fully contained. The identities of the attackers remain unknown, adding to the uncertainty surrounding the situation.

The impact of the cyberattack comes at a critical time for Malaysia’s transport infrastructure, which is a vital part of the country’s economy.

The incident raises important questions about the preparedness of major infrastructure to handle sophisticated cyber threats.

The situation highlights the growing risk of cyberattacks on critical infrastructure worldwide. Such attacks not only disrupt operations but also pose potential threats to passenger safety.

The government’s refusal to pay the ransom may lead to prolonged disruptions or further escalation by the attackers.

In response, experts advise enhancing cybersecurity measures, including strengthening network defenses and implementing more robust data protection policies.

Collaboration with international cybersecurity agencies could also provide valuable insights and strategies to combat future attacks.

As the situation continues to unfold, travelers and stakeholders will closely watch how Malaysia handles this high-profile cyber incident and the steps taken to safeguard its critical infrastructure in the future.

The Kuala Lumpur International Airport cyberattack serves as a stark reminder of the evolving landscape of cyber threats targeting critical infrastructure.

While the immediate crisis may eventually be resolved, the incident highlights the need for sustained investment in cybersecurity and preparedness to mitigate similar risks in the future.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth...

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT)...

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth...

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT)...