DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Major Malaysian water utilities company hit by hackers; Ranhill offline; hackers claim databases and backups deleted

Posted on July 26, 2023 by Dissent

After a period of quiet, DESORDEN Group has re-emerged as a threat to Malaysian entities, and now, it seems, to providing drinkable water to Johor (see this post from 2021 for an overview of Ranhill Utilities Berhad in the environment sector and the role of AquaSmart). In a statement sent to DataBreaches this morning, DESORDEN writes:

This is DESORDEN Group.

We take responsibilities for the recent data breach of a Malaysian conglomerate, Ranhill Utilities Berhad, providing water and power supply in Malaysia. Our attack has disrupted Ranhill operations in billing operations and water disruptions, affecting over 1 million customers. Affected systems include Ranhill’s Live Billing System, Mobile Application, and importantly their AquaSmart water management system.

The initial data breach was initiated on Nov 2021. For over 18 months, DESORDEN has been in their systems. On 17th July 2023, our group infiltrated their LIVE Billing System which handles online payment for more than a million of their customers. Between 18th July to 19th July, DESORDEN stole all of the databases in their billing system, deleted their backups and removed the databases entirely. On 19th July 2023, DESORDEN informed Ranhill management about the data breach and provided a deadline to respond by 21st July 2023. On 20th July, Ranhill company took all of their systems offline and brought the systems back online on 21st July 2023, without responding to DESORDEN (Live Billing System was still unrecoverable). On 23rd July 2023, DESORDEN launched a 2nd attack on their critical online system, AquaSmart which is Ranhill operational tool for managing water-related activities, repair scheduling and reservoir monitoring. Since 23rd July 2023, Ranhill systems are mostly taken offline without notifying the public.

On our end, DESORDEN has already stolen hundreds of gigabytes of files and databases, including sensitive personal information of their customers such as name, address, id card number, phone, email, payment information, etc. As well as their sensitive corporate information including both files, coding and data. We have included the evidences here: [redacted by DataBreaches]

As of today, DESORDEN has not received any responses from Ranhill management. Our group will begin releasing personal details of their customers every week on hacker forums until we receive a response from Ranhill.

As they have always done in the past, DESORDEN does provide proof of claims. In this case, there are seven files or archives with some screencaps, .csv files, and .mkv files that they created.  The files include notes left to Ranhill on their server telling them what DESORDEN acquired and how to contact them to prevent further leaks or attacks.

Proof of Claim files provided by DESORDEN with filenames:aquasmart.mkv BSCUSTOMER-Sample.csv email-server.png IBSPASSWORD.csv IBSPASSWORD_STAFF.csv PAYMENT.csv RANHILL-DATA.mkv The data sample was time-stamped July 26.
Proof of claim files offered to DataBreaches by DESORDEN Group. Image: DataBreaches.net

Ranhill does not appear to have issued any statement about the breach and has not responded to its customers who have been leaving comments and complaints on the firm’s Facebook page. The firm stopped updating its posts on July 13, prior to being notified by DESORDEN of the attack and financial demands, but the customers are using previous posts to make comments and ask questions.

Machine translated version of some comments on Ranhills’ Facebook page. Image: DataBreaches.net .

As one example, one customer wrote (machine translation):

I WANT TO ASK… RANHILL GROUP… WHAT HAS HAPPENED TO YOUR #APP AT GOOGLE PLAY CAN’T YOU REALLY USE IT OR CAN’T YOU USE IT IMMEDIATELY… AFTER THAT AT WED SITE RANHILL SAJ YOU COULDN’T USE IT FOR NEARLY A MONTH I TRIED TO PAY THE WATER BILL AT MY FATHER’S HOUSE I COULDN’t… IT’S A SHAME… HOPE YOU ALL RECOVER YOUR APP SYSTEM AND WEB SITES THAT ARE BAD EMBARRASSING THE PEOPLE AND HURTING THE PEOPLE OF JOHOR.

Others complain about having no water or too little water, but it is not clear whether that may be due to issues other than the attack.

As of publication time, Ranhill’s website remains down. DataBreaches sent an email inquiry to them using their customer support email address and info@ address, but no replies were immediately received. Also as of publication, DESORDEN has listed this incident on a popular hacking forum.

Category: Non-U.S.

Post navigation

← Group-IB founder Ilya Sachkov sentenced to 14 years in prison for high treason
Deloitte denies Cl0p data breach claims in wake of MOVEit attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch (1)
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.