{
	"id": "87fa589f-ee35-484f-b577-49155e0a0a49",
	"created_at": "2026-04-09T02:22:34.722928Z",
	"updated_at": "2026-04-10T13:13:04.971884Z",
	"deleted_at": null,
	"sha1_hash": "3f103db7c8c202b675f4a07d3535fb3615de10e9",
	"title": "Major Malaysian water utilities company hit by hackers; Ranhill offline; hackers claim databases and backups deleted - DataBreaches.Net",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 52326,
	"plain_text": "Major Malaysian water utilities company hit by hackers; Ranhill\r\noffline; hackers claim databases and backups deleted -\r\nDataBreaches.Net\r\nPublished: 2023-07-26 · Archived: 2026-04-09 02:07:55 UTC\r\nAfter a period of quiet, DESORDEN Group has re-emerged as a threat to Malaysian entities, and now, it seems, to\r\nproviding drinkable water to Johor (see this post from 2021 for an overview of Ranhill Utilities Berhad in the\r\nenvironment sector and the role of AquaSmart). In a statement sent to DataBreaches this morning, DESORDEN\r\nwrites:\r\nThis is DESORDEN Group.\r\nWe take responsibilities for the recent data breach of a Malaysian conglomerate, Ranhill Utilities\r\nBerhad, providing water and power supply in Malaysia. Our attack has disrupted Ranhill operations in\r\nbilling operations and water disruptions, affecting over 1 million customers. Affected systems include\r\nRanhill’s Live Billing System, Mobile Application, and importantly their AquaSmart water\r\nmanagement system.\r\nThe initial data breach was initiated on Nov 2021. For over 18 months, DESORDEN has been in their\r\nsystems. On 17th July 2023, our group infiltrated their LIVE Billing System which handles online\r\npayment for more than a million of their customers. Between 18th July to 19th July, DESORDEN stole\r\nall of the databases in their billing system, deleted their backups and removed the databases entirely. On\r\n19th July 2023, DESORDEN informed Ranhill management about the data breach and provided a\r\ndeadline to respond by 21st July 2023. On 20th July, Ranhill company took all of their systems offline\r\nand brought the systems back online on 21st July 2023, without responding to DESORDEN (Live\r\nBilling System was still unrecoverable). On 23rd July 2023, DESORDEN launched a 2nd attack on\r\ntheir critical online system, AquaSmart which is Ranhill operational tool for managing water-related\r\nactivities, repair scheduling and reservoir monitoring. Since 23rd July 2023, Ranhill systems are mostly\r\ntaken offline without notifying the public.\r\nOn our end, DESORDEN has already stolen hundreds of gigabytes of files and databases, including\r\nsensitive personal information of their customers such as name, address, id card number, phone, email,\r\npayment information, etc. As well as their sensitive corporate information including both files, coding\r\nand data. We have included the evidences here: [redacted by DataBreaches]\r\nAs of today, DESORDEN has not received any responses from Ranhill management. Our group will\r\nbegin releasing personal details of their customers every week on hacker forums until we receive a\r\nresponse from Ranhill.\r\nAs they have always done in the past, DESORDEN does provide proof of claims. In this case, there are seven files\r\nor archives with some screencaps, .csv files, and .mkv files that they created.  The files include notes left to\r\nhttps://www.databreaches.net/major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-backups-deleted/\r\nPage 1 of 3\n\nRanhill on their server telling them what DESORDEN acquired and how to contact them to prevent further leaks\r\nor attacks.\r\nProof of Claim files provided by DESORDEN with filenames:aquasmart.mkv BSCUSTOMER-Sample.csv email-server.png IBSPASSWORD.csv IBSPASSWORD_STAFF.csv PAYMENT.csv\r\nRANHILL-DATA.mkv The data sample was time-stamped July 26.\r\nProof of claim files offered to DataBreaches by DESORDEN Group. Image: DataBreaches.net\r\nRanhill does not appear to have issued any statement about the breach and has not responded to its customers who\r\nhave been leaving comments and complaints on the firm’s Facebook page. The firm stopped updating its posts on\r\nJuly 13, prior to being notified by DESORDEN of the attack and financial demands, but the customers are using\r\nprevious posts to make comments and ask questions.\r\nMachine translated version of some comments on Ranhills’ Facebook page. Image:\r\nDataBreaches.net .\r\nAs one example, one customer wrote (machine translation):\r\nI WANT TO ASK… RANHILL GROUP… WHAT HAS HAPPENED TO YOUR #APP AT GOOGLE\r\nPLAY CAN’T YOU REALLY USE IT OR CAN’T YOU USE IT IMMEDIATELY… AFTER THAT\r\nAT WED SITE RANHILL SAJ YOU COULDN’T USE IT FOR NEARLY A MONTH I TRIED TO\r\nPAY THE WATER BILL AT MY FATHER’S HOUSE I COULDN’t… IT’S A SHAME… HOPE YOU\r\nALL RECOVER YOUR APP SYSTEM AND WEB SITES THAT ARE BAD EMBARRASSING THE\r\nPEOPLE AND HURTING THE PEOPLE OF JOHOR.\r\nOthers complain about having no water or too little water, but it is not clear whether that may be due to issues\r\nother than the attack.\r\nAs of publication time, Ranhill’s website remains down. DataBreaches sent an email inquiry to them using their\r\ncustomer support email address and info@ address, but no replies were immediately received. Also as of\r\npublication, DESORDEN has listed this incident on a popular hacking forum.\r\nhttps://www.databreaches.net/major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-backups-deleted/\r\nPage 2 of 3\n\nSource: https://www.databreaches.net/major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-ba\r\nckups-deleted/\r\nhttps://www.databreaches.net/major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-backups-deleted/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"ETDA",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.databreaches.net/major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-backups-deleted/"
	],
	"report_names": [
		"major-malaysian-water-utilities-company-hit-by-hackers-ranhill-offline-hackers-claim-databases-and-backups-deleted"
	],
	"threat_actors": [
		{
			"id": "e5ccc758-f2a5-417b-ba5c-70edf39bc048",
			"created_at": "2022-10-25T16:07:24.481513Z",
			"updated_at": "2026-04-10T02:00:05.005021Z",
			"deleted_at": null,
			"main_name": "Desorden",
			"aliases": [],
			"source_name": "ETDA:Desorden",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "3a69a32c-82d0-431b-b5ab-34a070bf8d94",
			"created_at": "2023-11-08T02:00:07.154393Z",
			"updated_at": "2026-04-10T02:00:03.428568Z",
			"deleted_at": null,
			"main_name": "Desorden Group",
			"aliases": [],
			"source_name": "MISPGALAXY:Desorden Group",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "75108fc1-7f6a-450e-b024-10284f3f62bb",
			"created_at": "2024-11-01T02:00:52.756877Z",
			"updated_at": "2026-04-10T02:00:05.273746Z",
			"deleted_at": null,
			"main_name": "Play",
			"aliases": null,
			"source_name": "MITRE:Play",
			"tools": [
				"Nltest",
				"AdFind",
				"PsExec",
				"Wevtutil",
				"Cobalt Strike",
				"Playcrypt",
				"Mimikatz"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775701354,
	"ts_updated_at": 1775826784,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3f103db7c8c202b675f4a07d3535fb3615de10e9.pdf",
		"text": "https://archive.orkl.eu/3f103db7c8c202b675f4a07d3535fb3615de10e9.txt",
		"img": "https://archive.orkl.eu/3f103db7c8c202b675f4a07d3535fb3615de10e9.jpg"
	}
}