DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Major Malaysian water utilities company hit by hackers; Ranhill offline; hackers claim databases and backups deleted

Posted on July 26, 2023 by Dissent

After a period of quiet, DESORDEN Group has re-emerged as a threat to Malaysian entities, and now, it seems, to providing drinkable water to Johor (see this post from 2021 for an overview of Ranhill Utilities Berhad in the environment sector and the role of AquaSmart). In a statement sent to DataBreaches this morning, DESORDEN writes:

This is DESORDEN Group.

We take responsibilities for the recent data breach of a Malaysian conglomerate, Ranhill Utilities Berhad, providing water and power supply in Malaysia. Our attack has disrupted Ranhill operations in billing operations and water disruptions, affecting over 1 million customers. Affected systems include Ranhill’s Live Billing System, Mobile Application, and importantly their AquaSmart water management system.

The initial data breach was initiated on Nov 2021. For over 18 months, DESORDEN has been in their systems. On 17th July 2023, our group infiltrated their LIVE Billing System which handles online payment for more than a million of their customers. Between 18th July to 19th July, DESORDEN stole all of the databases in their billing system, deleted their backups and removed the databases entirely. On 19th July 2023, DESORDEN informed Ranhill management about the data breach and provided a deadline to respond by 21st July 2023. On 20th July, Ranhill company took all of their systems offline and brought the systems back online on 21st July 2023, without responding to DESORDEN (Live Billing System was still unrecoverable). On 23rd July 2023, DESORDEN launched a 2nd attack on their critical online system, AquaSmart which is Ranhill operational tool for managing water-related activities, repair scheduling and reservoir monitoring. Since 23rd July 2023, Ranhill systems are mostly taken offline without notifying the public.

On our end, DESORDEN has already stolen hundreds of gigabytes of files and databases, including sensitive personal information of their customers such as name, address, id card number, phone, email, payment information, etc. As well as their sensitive corporate information including both files, coding and data. We have included the evidences here: [redacted by DataBreaches]

As of today, DESORDEN has not received any responses from Ranhill management. Our group will begin releasing personal details of their customers every week on hacker forums until we receive a response from Ranhill.

As they have always done in the past, DESORDEN does provide proof of claims. In this case, there are seven files or archives with some screencaps, .csv files, and .mkv files that they created.  The files include notes left to Ranhill on their server telling them what DESORDEN acquired and how to contact them to prevent further leaks or attacks.

Proof of Claim files provided by DESORDEN with filenames:aquasmart.mkv BSCUSTOMER-Sample.csv email-server.png IBSPASSWORD.csv IBSPASSWORD_STAFF.csv PAYMENT.csv RANHILL-DATA.mkv The data sample was time-stamped July 26.
Proof of claim files offered to DataBreaches by DESORDEN Group. Image: DataBreaches.net

Ranhill does not appear to have issued any statement about the breach and has not responded to its customers who have been leaving comments and complaints on the firm’s Facebook page. The firm stopped updating its posts on July 13, prior to being notified by DESORDEN of the attack and financial demands, but the customers are using previous posts to make comments and ask questions.

Machine translated version of some comments on Ranhills’ Facebook page. Image: DataBreaches.net .

As one example, one customer wrote (machine translation):

I WANT TO ASK… RANHILL GROUP… WHAT HAS HAPPENED TO YOUR #APP AT GOOGLE PLAY CAN’T YOU REALLY USE IT OR CAN’T YOU USE IT IMMEDIATELY… AFTER THAT AT WED SITE RANHILL SAJ YOU COULDN’T USE IT FOR NEARLY A MONTH I TRIED TO PAY THE WATER BILL AT MY FATHER’S HOUSE I COULDN’t… IT’S A SHAME… HOPE YOU ALL RECOVER YOUR APP SYSTEM AND WEB SITES THAT ARE BAD EMBARRASSING THE PEOPLE AND HURTING THE PEOPLE OF JOHOR.

Others complain about having no water or too little water, but it is not clear whether that may be due to issues other than the attack.

As of publication time, Ranhill’s website remains down. DataBreaches sent an email inquiry to them using their customer support email address and info@ address, but no replies were immediately received. Also as of publication, DESORDEN has listed this incident on a popular hacking forum.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
Category: Non-U.S.

Post navigation

← Group-IB founder Ilya Sachkov sentenced to 14 years in prison for high treason
Deloitte denies Cl0p data breach claims in wake of MOVEit attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.