Malaysian Government Details
Malaysian Government
Putrajaya • 1000000 employees • Governments
https://www.malaysia.gov.my/portal/index
Malaysia
Industry
Governments
Security Incidents
1
The Malaysian Government, also known as the Federal Government of Malaysia, is the federal administrative authority of Malaysia, a parliamentary democracy and constitutional monarchy. It operates under the framework of the Westminster parliamentary system and is divided into three branches: the Executive, the Legislature, and the Judiciary. The Executive is headed by the Prime Minister, who acts as the head of government, while the King (Yang di-Pertuan Agong) serves as the ceremonial head of state.
Malaysia gained independence from British colonial rule on August 31, 1957. Since then, its go...
Show more
Security Incidents
Malaysian Government Breach of Jul 2024
Show more
Cons...
Show more
While the investigation has not definitively confirmed the exposure of customer data, given the targets, it's highly likely that sensitive political and gov...
Show more
Severity Score
Significant to High
Type
UnknownSummary
In July, threat actors launched a targeted cyberattack against political figures and government officials in Malaysia, leveraging malicious ISO files to deliver Babylon RAT. The ISO files contained multiple components, including a shortcut file, a hidden PowerShell script, a malicious executable, and a decoy PDF file, designed to deceive users into thinking they were interacting with legitimate documents. Upon opening the ISO file, a PowerShell script executed in the background, launching the decoy PDF and copying the malicious executable to the %appdata% directory, while creating a registry e...Show more
Severity
The recent targeted cyberattack campaign against Malaysian political figures and government officials, leveraging malicious ISO files to deliver the Babylon RAT, presents a significant threat. The attack, active since July, uses sophisticated techniques involving multiple components, including PowerShell scripts and decoy PDF files, to deceive victims and establish persistent control over their devices. Given Babylon RAT's capabilities in surveillance, data theft, and remote control, the campaign poses severe risks to sensitive information and operations within high-profile institutions.Cons...
Show more
Impact
The recent cyberattack campaign targeting high-profile individuals and government officials in Malaysia involved the deployment of malicious ISO files, ultimately delivering the Babylon Remote Access Trojan (RAT). This attack, active since July, primarily sought to compromise and gather sensitive information from its victims, leveraging sophisticated techniques such as hidden PowerShell scripts, malicious executables, and decoy PDF files.While the investigation has not definitively confirmed the exposure of customer data, given the targets, it's highly likely that sensitive political and gov...
Show more
KEEP YOUR ENVIRONMENT SECURE
Weak credentials are the leading cause of breaches. Beyond Identity can help.
See MFA exploits in action
Watch how adversaries exploit companies in quick videos