{
	"id": "54dcba45-7242-4546-96ac-f7f21f6618f7",
	"created_at": "2026-04-09T02:23:32.840507Z",
	"updated_at": "2026-04-10T13:11:21.918736Z",
	"deleted_at": null,
	"sha1_hash": "6388128fcb0e42cf0ab0157ebdd70313354c08b7",
	"title": "Thailand's THE ICON GROUP hacked by DESORDEN - DataBreaches.Net",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 121792,
	"plain_text": "Thailand's THE ICON GROUP hacked by DESORDEN -\r\nDataBreaches.Net\r\nPublished: 2022-10-02 · Archived: 2026-04-09 02:05:57 UTC\r\nDESORDEN Group’s attacks on ASEAN businesses continue. This week, they disclosed a hack of The Icon\r\nGroup in Thailand.\r\nIn a statement on a popular hacking forum, DESORDEN writes:\r\nThis data breach involved 161 GB of databases and files, including personal information of 264,128\r\ncustomers, with their full name, ID card number, bank account number, address, phone, email, etc,\r\nalong with KYC images of their customers such as ID card copy, bank book copy and KYC docs. In\r\naddition, we have also stolen their company corporate and financial data.\r\nAs is their usual practice, DESORDEN provided samples from various .csv files, but they also leaked some KYC\r\nimage files.\r\nKnow Your Client (KYC) image files showed individuals’ faces and photocopies of identity information about the\r\nindividual. Redacted by DataBreaches.net.\r\nWhen asked, DESORDEN informed DataBreaches that they did not have KYC images for all 264,000 customers\r\nbut estimated they had about 70,000 such sets.  According to them, The Icon Group did not respond to any of their\r\ncommunications.\r\nDataBreaches sent an email inquiry to The Icon Group, asking for their comments on DESORDEN’s claims and\r\nwhether they were notifying any regulator or customers whose personal information had been accessed or\r\nacquired. No reply has been received.\r\nDESORDEN claims that they have had access to The Icon Group since approximately July and still have access to\r\nit. If they still have access, customers, employees, and regulators may want an explanation from the firm as to\r\nwhat they did when they first discovered a breach.\r\nhttps://www.databreaches.net/thailands-the-icon-group-hacked-by-desorden/\r\nPage 1 of 2\n\nSource: https://www.databreaches.net/thailands-the-icon-group-hacked-by-desorden/\r\nhttps://www.databreaches.net/thailands-the-icon-group-hacked-by-desorden/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"ETDA",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.databreaches.net/thailands-the-icon-group-hacked-by-desorden/"
	],
	"report_names": [
		"thailands-the-icon-group-hacked-by-desorden"
	],
	"threat_actors": [
		{
			"id": "e5ccc758-f2a5-417b-ba5c-70edf39bc048",
			"created_at": "2022-10-25T16:07:24.481513Z",
			"updated_at": "2026-04-10T02:00:05.005021Z",
			"deleted_at": null,
			"main_name": "Desorden",
			"aliases": [],
			"source_name": "ETDA:Desorden",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "3a69a32c-82d0-431b-b5ab-34a070bf8d94",
			"created_at": "2023-11-08T02:00:07.154393Z",
			"updated_at": "2026-04-10T02:00:03.428568Z",
			"deleted_at": null,
			"main_name": "Desorden Group",
			"aliases": [],
			"source_name": "MISPGALAXY:Desorden Group",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775701412,
	"ts_updated_at": 1775826681,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6388128fcb0e42cf0ab0157ebdd70313354c08b7.pdf",
		"text": "https://archive.orkl.eu/6388128fcb0e42cf0ab0157ebdd70313354c08b7.txt",
		"img": "https://archive.orkl.eu/6388128fcb0e42cf0ab0157ebdd70313354c08b7.jpg"
	}
}