Discovered
2025-08-18 15:47 UTC
Est. attack date
2025-08-05
Country
Description:
We have exfiltrated over 500GB of most sensitive and business-critical data from palmgold's internal network. This includes data from both the Casino Division and the Credit Division, where the Casino Division holds the full operational database of over 60,000 members including PII, jackpot and play history, betting patterns, machine configurations, Power BI dashboards used for internal analytics, confidential finance, HR, and IT documents, complete scanner share contents from all branches (kmscan, toshibascan, fujiscan), as well as operational logic such as promotion formulas, game-specific revenue models, slot machine volatility settings, player-tier betting analytics, risk thresholds, fraud alert triggers, and blacklist criteria, while the Credit Division (pgcredit.com.my) contains all customer KYC information along with detailed banking and cash transaction records.
DNS Records:
The following DNS records were found for the victim's domain.
- compliance_abusewebnic.cc
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.