{
	"id": "78c671f9-3337-4431-89cf-80c276671989",
	"created_at": "2026-04-06T00:15:38.645199Z",
	"updated_at": "2026-04-10T13:11:20.623478Z",
	"deleted_at": null,
	"sha1_hash": "2f5caf9991b93bb772ef38a45e8ee8e157281220",
	"title": "Absolute Telecom Data Breach: 34GB Data Compromised",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 602127,
	"plain_text": "Absolute Telecom Data Breach: 34GB Data Compromised\r\nPublished: 2024-06-10 · Archived: 2026-04-05 12:56:18 UTC\r\nAbsolute Telecom Pte Ltd, a prominent telecommunications company based in Singapore, has fallen victim to an\r\nalleged cyberattack. \r\nThe Absolute Telecom data breach, allegedly on May 15, 2024, has been attributed to a hacker known as\r\n“GHOSTR,” who claims to have infiltrated and compromised the company’s server networks. \r\nThis Absolute Telecom data leak has resulted in the exposure of sensitive data totaling over 34GB, including\r\ninternal information such as login credentials, passwords, and subscriber details.\r\nDecoding the Absolute Telecom Data Breach Claims\r\nSource: Dark Web\r\nThe compromised data in this Absolute Telecom data breach encompasses a range of crucial information,\r\nincluding corporate records, accounting data, sales statistics, customer particulars, full credit card details, and call\r\nrecords. GHOSTR, in a post on a hacker forum, boasted about the successful breach and the acquisition of the\r\nextensive database belonging to Absolute Telecom Pte Ltd.\r\nAttempts to reach out to Absolute Telecom for clarification on the extent and impact of the breach have been\r\nimpeded by the unavailability of their website, which is currently offline and unresponsive.\r\nThis outage has hindered communication with the organization, leaving many questions unanswered regarding the\r\nsecurity implications and measures being taken to address the breach.\r\nhttps://thecyberexpress.com/alleged-absolute-telecom-data-breach/\r\nPage 1 of 2\n\nAfter the alleged cyberattack on Absolute Telecom’s website, users attempting to access the site may encounter a\r\n‘took too long to respond’ error message. This service disruption indicates the impact of the breach on the\r\ncompany’s digital infrastructure, highlighting the severity of the situation and the challenges faced in restoring\r\nnormalcy to their online operations.\r\nWho is the GHOSTR Hacker Group?\r\nGhostR, a financially driven threat actor, gained notoriety for pilfering a confidential database of 5.3 million\r\nrecords from World-Check. They also leaked approximately 186GB of data from a stock trading platform.\r\nGhostR’s activities on Breachforums include exposing extensive data breaches affecting Thai users, and revealing\r\npersonal information like full names, phone numbers, email addresses, and ID card numbers. As of now, there are\r\nno associated families linked with this actor.\r\nThe cyberattack on Absolute Telecom underscores the persistent threat posed by malicious actors seeking to\r\nexploit vulnerabilities in digital infrastructure.\r\nAs organizations continue to rely heavily on technology to conduct their operations, safeguarding against cyber\r\nthreats remains paramount to protect sensitive data and maintain the trust of customers and stakeholders alike.\r\nThis is an ongoing story and The Cyber Express will be closely monitoring the situation. We’ll update this post\r\nonce we have more information on the alleged Absolute Telecom data breach or any official confirmation from the\r\norganization.\r\nMedia Disclaimer: This report is based on internal and external research obtained through various means. The\r\ninformation provided is for reference purposes only, and users bear full responsibility for their reliance on it. The\r\nCyber Express assumes no liability for the accuracy or consequences of using this information.\r\nSource: https://thecyberexpress.com/alleged-absolute-telecom-data-breach/\r\nhttps://thecyberexpress.com/alleged-absolute-telecom-data-breach/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://thecyberexpress.com/alleged-absolute-telecom-data-breach/"
	],
	"report_names": [
		"alleged-absolute-telecom-data-breach"
	],
	"threat_actors": [
		{
			"id": "6e8effad-d9fb-4b49-bba4-9b4e5953356d",
			"created_at": "2024-04-23T02:00:04.243074Z",
			"updated_at": "2026-04-10T02:00:03.630533Z",
			"deleted_at": null,
			"main_name": "GhostR",
			"aliases": [],
			"source_name": "MISPGALAXY:GhostR",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434538,
	"ts_updated_at": 1775826680,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2f5caf9991b93bb772ef38a45e8ee8e157281220.pdf",
		"text": "https://archive.orkl.eu/2f5caf9991b93bb772ef38a45e8ee8e157281220.txt",
		"img": "https://archive.orkl.eu/2f5caf9991b93bb772ef38a45e8ee8e157281220.jpg"
	}
}