Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

MALAYSIA AIRPORTS HOLDINGS BERHAD Part 1 of data taken !!!

malaysiaairports.com.my

Group Qilin
Discovered 2025-05-01 14:12 UTC
Est. attack date 2025-03-23
Country MY
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Our team managed to breach and encrypt Malaysia Airport Holdings Berhad's network, further read as MAHB. The network was completely encrypted excluding flight control systems and over 2TB of data leaked from there. It was a complex IT o ...

Infostealer activity detected by HudsonRock

Compromised Employees: 132

Compromised Users: 277

Third Party Employee Credentials: 54


External Attack Surface: 120


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domregfirstonline.com.my
MX Records
  • aspmx.l.google.com. Google Workspace
  • alt1.aspmx.l.google.com. Google Workspace
  • alt2.aspmx.l.google.com. Google Workspace
  • alt4.aspmx.l.google.com. Google Workspace
  • alt3.aspmx.l.google.com. Google Workspace
TXT Records
  • google-site-verification=0D-lVAPkPuOkmQD5e_99D-Fb6Ww76KxrWWTGIxIOSQ8
  • google-site-verification=qIs9frCsiNSfXEGUq98J_4bi5KjXVyyBc-ZJNbDblns
  • successfactors-site-verification=MWY0NDgyYmZkNWQzMTljMGQ0ZjRhOGI0NzNhYzdlZjlhNmVjNDFkY2RlMWRmMDM0NzA4ZDI3ODUzYjM0MzE4MA==
  • google-site-verification=1DDyQWpwkzc5gZ7dkPKowc8-8sF_uFMVY74bL82Pjm8
  • v=spf1 +a +mx ip4:101.78.24.9 ip4:101.78.24.16 ip4:101.78.20.242 ip4:219.93.7.2 ip4:219.93.7.3 ip4:219.93.7.5 ip4:219.93.7.34 ip4:219.93.7.35 ip4:121.121.255.130 include:_spf.google.com include:_spf-dc10.sapsf.com ~all
  • MS=ms55950863
  • v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0DRyWFEsDRpXbRybOtnagXFjz6WvYlsozDgyNj4CezgVsflqqdf845E6KFA+BOpc7Pl2GrcLH+JRanqNQziUJ0suSDCmKbo39vXyIbqKIFWfHUMtDBgs/vstxeQ15ityYMKi1fY3BZ+Gvts6ColWj6VOwN1HEh50L1G12dmb3QnnNvcrwAQ5AW9i70S/" "tWfajgV4eHYzutzGjFusZWgrc3Z7igmC5ijkNCZckYkpbHlNWBOpqSAWBrnUDQSdxfmNZI/q8wqYgMwrmHQ6cA6rUiXFl9hgjcMw0vwJ8wQnN1NnkedKbm0gLkHVry3/qXHrDxaMgtl80T73xr9R00+9wwIDAQAB
  • zoho-verification=zb70838450.zmverify.zoho.com
  • google-site-verification=CFfooCMyB-8j8rRHvoBRYt_vPxYKcwXYd4mqtlS0G8k
Cloud / SaaS Services Detected
Microsoft 365 Zoho Campaigns

Leak Screenshot:

Leak Screenshot