{
	"id": "755b0ef6-7978-4946-ba65-4ef049e908d9",
	"created_at": "2026-04-06T00:18:39.350579Z",
	"updated_at": "2026-04-10T03:36:01.413662Z",
	"deleted_at": null,
	"sha1_hash": "f488b6e7b75a18d36f809ea456a3a8ea984350e9",
	"title": "Victorian Freight Specialists suffers alleged 800+GB data breach",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 209742,
	"plain_text": "Victorian Freight Specialists suffers alleged 800+GB data breach\r\nBy David Hollingworth\r\nPublished: 2024-06-05 · Archived: 2026-04-05 13:19:01 UTC\r\nA threat actor, known only as GhostR, claims hack on Australian logistics company Victorian Freight Specialists\r\nand posts data to clear web hacking forum.\r\nA Victorian logistics firm has fallen foul of a notorious hacking group, which is claiming to have 846 gigabytes of\r\npurloined data.\r\nGhostR – who recently shared data belonging to PC component company Cooler Master – posted details of the\r\nhack overnight on a popular clear web hacking forum.\r\n“GhostR has hacked and breached into Victorian Freight Specialists (victorianfreight.com.au) server networks on\r\n26th May 2024 and we have stolen over 846GB of their databases,” the hacker said in a 4 June post.\r\n“This data breach involves their corporate, accounting, sales, customers, agents, and freight databases.”\r\nThe post includes a link to sample data hosted on an anonymous online file-sharing platform, but as of writing,\r\nthat particular link is returning a “This folder was not found” error. However, GovInfoSecurity was able to access\r\nthe data.\r\n“Sample data appears to include internal data taken from an SQL database and screenshots of logon screens,”\r\nGovInfoSecurity said.\r\nVictorian Freight Specialists is a freight company based in Dandenong, Victoria, that serves regional Victoria and\r\nsouthern NSW. The company has several depots in Dandenong and Altona and 26 agents throughout Victoria.\r\nhttps://www.cyberdaily.au/security/10667-victorian-freight-specialists-suffers-alleged-800-gigabyte-data-breach\r\nPage 1 of 2\n\nAs of writing, the company’s website appears to be down, though it is unknown whether or not this is linked to the\r\nalleged hack.\r\nCyber Daily has reached out to Victorian Freight Specialists for comment.\r\nThe hacker, GhostR is making a bit of a name for itself and has been responsible for a string of high-profile hacks\r\nin Thailand, including the PhyaThai Hospital Group, Thai Beverage PLC, and the Metro Group of Hospitals in\r\nIndia.\r\nWant to see more stories from trusted news sources?\r\nMake Cyber Daily a preferred news source on Google.\r\nDavid Hollingworth\r\nDavid Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and\r\nonline titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about\r\nLego.\r\nSource: https://www.cyberdaily.au/security/10667-victorian-freight-specialists-suffers-alleged-800-gigabyte-data-breach\r\nhttps://www.cyberdaily.au/security/10667-victorian-freight-specialists-suffers-alleged-800-gigabyte-data-breach\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.cyberdaily.au/security/10667-victorian-freight-specialists-suffers-alleged-800-gigabyte-data-breach"
	],
	"report_names": [
		"10667-victorian-freight-specialists-suffers-alleged-800-gigabyte-data-breach"
	],
	"threat_actors": [
		{
			"id": "6e8effad-d9fb-4b49-bba4-9b4e5953356d",
			"created_at": "2024-04-23T02:00:04.243074Z",
			"updated_at": "2026-04-10T02:00:03.630533Z",
			"deleted_at": null,
			"main_name": "GhostR",
			"aliases": [],
			"source_name": "MISPGALAXY:GhostR",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434719,
	"ts_updated_at": 1775792161,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f488b6e7b75a18d36f809ea456a3a8ea984350e9.pdf",
		"text": "https://archive.orkl.eu/f488b6e7b75a18d36f809ea456a3a8ea984350e9.txt",
		"img": "https://archive.orkl.eu/f488b6e7b75a18d36f809ea456a3a8ea984350e9.jpg"
	}
}