DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Thai loyalty membership card data of 5 million customers put up for sale on hacking forum

Posted on November 20, 2024 by Dissent

Central Group is a multinational conglomerate in Thailand that describes itself as one of the largest private commercial conglomerates in Thailand with more than 50 subsidiaries and six key business lines. In October 2021, DataBreaches reported an attack on the Central Restaurant Group by threat actors called DESORDEN. When negotiations failed, DESORDEN revealed details about the scope of the attack. Now, it seems another threat actor has obtained data from another Central Group subsidiary.

On November 19, DataBreaches received an email from someone identifying themself as “0mid16B, the same hacker who breached BlackCanyonThai and AIS Serenade on Nov 2024, and shocked the Thai society by bulk notifying over 700,000 of their members at 4am in the morning, resulting in massive news coverage the next following day.” The remainder of the email described an incident involving the Central Retail Corporation, a publicly owned subsidiary of Central Group.

0mid16B, who tells DataBreaches that they* have never worked with DESORDEN or ALTDOS, wrote:

Between August to November 2024, i have accessed and stolen 5,108,826 records of Central Group’s The1 Card member personal information via an exposed compromised API endpoint of Central Retail network.

Central Group uses The1 Card membership system across every retail and consumer brand under the Central Group. The1 Card describes itself as Thailand’s largest loyalty platform, with over 17 million members, or about 25% of Thailand’s population.

“Due to failed negotiation with Central Group,” 0mid16B reportedly decided to sell the data of 5,108,826 records of The1 member personal information. “The stolen information includes First Name, Last Name, Membership Number, National Card ID Number, Country, Mobile Phone and Email. Total size is 582MB,” 0mid16B wrote.

0mid16B provided a sample of the data with a way to verify its authenticity. Hours later, the listing appeared on the hacking forum. In the listing, 0mid16B offered to use a middleman escrow service.  That is usually (but not always) an indicator of a legitimate seller. The ability to test the sample of data to confirm its validity and the video will also likely persuade potential buyers.

Image: DataBreaches.net

0mid16B also posted the listing on X.com, commenting, “Thai companies do not care about protecting data. Because nothing will happen to them – no PDPA fines, no compensation for customers and no liability #lmao Thai people does not demand for their rights.”

DataBreaches asked 0mid16B what happened with the negotiations, curious as to whether Central Group had made a deal with them and then broken it as they had allegedly done to DESORDEN. 0mid16B informed DataBreaches that they had been exfiltrating data until they were detected. Then:

I contacted the management, and an unidentified person contacted me with a request to hold off any intention to publish. No monetary value was discussed, however a ton of questions on how i stole the data. The contact went uncontactable, and i decide it is time to publish it.

DataBreaches emailed Central Group’s contact email and data protection office last night but has received no reply by publication. DataBreaches also sent email inquiries to Central Group’s email contacts for investor relations and public relations. Both of those bounced back with “Recipient address rejected: undeliverable” failure messages. This post may be updated if a reply is received.


*  0mid16B informed DataBreaches that they are one individual and not a group. DataBreaches is using “they/them” because they did not indicate their gender pronoun preference. 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
Category: Breach IncidentsHack

Post navigation

← Attackers Targeting VPNs Account for 28.7 Percent of Ransomware Incidents in Q3 According to Corvus Insurance Cyber Threat Report
5 Alleged Members of Scattered Spider Charged Federally (1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.
  • NCERT Issues Advisory on “Blue Locker” Ransomware Targeting Pakistan’s Key Institutions
  • Scattered Spider has a new Telegram channel to list its attacks
  • SC: Spartanburg County hit by cyberattack, some online services disrupted
  • Pakistan Petroleum thwarts ransomware attempt, says no critical data compromised
  • ShinyHunters sent Google an extortion demand; Shiny comments on current activities
  • Air France and KLM alert customers to data breach on external platform
  • Samourai CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill Pled Guilty to Operating a Money Transmitting Business, Samourai Wallet, That Transmitted Over $200 Million in Criminal Proceeds

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.