DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Major Malaysian water utilities company hit by hackers; Ranhill offline; hackers claim databases and backups deleted

Posted on July 26, 2023 by Dissent

After a period of quiet, DESORDEN Group has re-emerged as a threat to Malaysian entities, and now, it seems, to providing drinkable water to Johor (see this post from 2021 for an overview of Ranhill Utilities Berhad in the environment sector and the role of AquaSmart). In a statement sent to DataBreaches this morning, DESORDEN writes:

This is DESORDEN Group.

We take responsibilities for the recent data breach of a Malaysian conglomerate, Ranhill Utilities Berhad, providing water and power supply in Malaysia. Our attack has disrupted Ranhill operations in billing operations and water disruptions, affecting over 1 million customers. Affected systems include Ranhill’s Live Billing System, Mobile Application, and importantly their AquaSmart water management system.

The initial data breach was initiated on Nov 2021. For over 18 months, DESORDEN has been in their systems. On 17th July 2023, our group infiltrated their LIVE Billing System which handles online payment for more than a million of their customers. Between 18th July to 19th July, DESORDEN stole all of the databases in their billing system, deleted their backups and removed the databases entirely. On 19th July 2023, DESORDEN informed Ranhill management about the data breach and provided a deadline to respond by 21st July 2023. On 20th July, Ranhill company took all of their systems offline and brought the systems back online on 21st July 2023, without responding to DESORDEN (Live Billing System was still unrecoverable). On 23rd July 2023, DESORDEN launched a 2nd attack on their critical online system, AquaSmart which is Ranhill operational tool for managing water-related activities, repair scheduling and reservoir monitoring. Since 23rd July 2023, Ranhill systems are mostly taken offline without notifying the public.

On our end, DESORDEN has already stolen hundreds of gigabytes of files and databases, including sensitive personal information of their customers such as name, address, id card number, phone, email, payment information, etc. As well as their sensitive corporate information including both files, coding and data. We have included the evidences here: [redacted by DataBreaches]

As of today, DESORDEN has not received any responses from Ranhill management. Our group will begin releasing personal details of their customers every week on hacker forums until we receive a response from Ranhill.

As they have always done in the past, DESORDEN does provide proof of claims. In this case, there are seven files or archives with some screencaps, .csv files, and .mkv files that they created.  The files include notes left to Ranhill on their server telling them what DESORDEN acquired and how to contact them to prevent further leaks or attacks.

Proof of Claim files provided by DESORDEN with filenames:aquasmart.mkv BSCUSTOMER-Sample.csv email-server.png IBSPASSWORD.csv IBSPASSWORD_STAFF.csv PAYMENT.csv RANHILL-DATA.mkv The data sample was time-stamped July 26.
Proof of claim files offered to DataBreaches by DESORDEN Group. Image: DataBreaches.net

Ranhill does not appear to have issued any statement about the breach and has not responded to its customers who have been leaving comments and complaints on the firm’s Facebook page. The firm stopped updating its posts on July 13, prior to being notified by DESORDEN of the attack and financial demands, but the customers are using previous posts to make comments and ask questions.

Machine translated version of some comments on Ranhills’ Facebook page. Image: DataBreaches.net .

As one example, one customer wrote (machine translation):

I WANT TO ASK… RANHILL GROUP… WHAT HAS HAPPENED TO YOUR #APP AT GOOGLE PLAY CAN’T YOU REALLY USE IT OR CAN’T YOU USE IT IMMEDIATELY… AFTER THAT AT WED SITE RANHILL SAJ YOU COULDN’T USE IT FOR NEARLY A MONTH I TRIED TO PAY THE WATER BILL AT MY FATHER’S HOUSE I COULDN’t… IT’S A SHAME… HOPE YOU ALL RECOVER YOUR APP SYSTEM AND WEB SITES THAT ARE BAD EMBARRASSING THE PEOPLE AND HURTING THE PEOPLE OF JOHOR.

Others complain about having no water or too little water, but it is not clear whether that may be due to issues other than the attack.

As of publication time, Ranhill’s website remains down. DataBreaches sent an email inquiry to them using their customer support email address and info@ address, but no replies were immediately received. Also as of publication, DESORDEN has listed this incident on a popular hacking forum.

Category: Non-U.S.

Post navigation

← Group-IB founder Ilya Sachkov sentenced to 14 years in prison for high treason
Deloitte denies Cl0p data breach claims in wake of MOVEit attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts
  • MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack
  • Four REvil ransomware members released after time served on carding charges
  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.