Skip to main content


Lizard Squad hits Malaysia Airlines website

posted onJanuary 27, 2015
by l33tdawg

The website of Malaysia Airlines was commandeered for several hours by hackers who referenced the Islamic State jihadists and threatened to expose data taken from the carrier's servers.

The attack, whose motivation remained unclear, was claimed by the "Lizard Squad", a group that has taken credit previously for denial-of-service attacks around the world.

It is not clear why the troubled airline was targeted, but the Lizard Squad said on its Twitter feed that it was: "Going to dump some loot found on servers soon."

Hackers broke into Malaysian Department of Civil Aviation ONE DAY after MH370 incident

posted onAugust 20, 2014
by l33tdawg

The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen.

The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia – a Ministry of Science, Technology and Innovation agency – had the transmissions blocked and the infected machines shut down.

Wikileaks Reveals Super Injunction Blocking Reporting On Massive Australian Corruption Case Involving Leaders Of Malaysia, Indonesia & Vietnam

posted onJuly 31, 2014
by l33tdawg

Today, 29 July 2014, WikiLeaks releases an unprecedented Australian censorship order concerning a multi-million dollar corruption case explicitly naming the current and past heads of state of Indonesia, Malaysia and Vietnam, their relatives and other senior officials. The super-injunction invokes “national security” grounds to prevent reporting about the case, by anyone, in order to “prevent damage to Australia's international relations”.

Threat Intelligence to run pioneering training course at #HITB2014KUL

posted onJuly 3, 2014
by l33tdawg

Threat Intelligence, an Australian security consultancy specialising in the next era of intelligence-based threat management and penetration testing, today announced that it has been selected to run its cutting-edge “Practical Threat Intelligence” course at the prestigious Hack In The Box Security Conference (“HITBSecConf”) in Kuala Lumpur in Malaysia, October 13 – 16 October 2014.

MAS blames software for 'MH370 in Cambodia' gaffe

posted onMay 3, 2014
by l33tdawg

Malaysia Airlines (MAS) has blamed the software that it used to track its aircraft for its erroneous report to air traffic controllers that MH370 was flying over Cambodian airspace about an hour after it went missing.

MAS explained that it made the deduction based on its ‘flight-following system’ which displayed the aircraft’s predicted position and not its actual location.

Standard Chartered elite customer details on alleged hacker's laptop

posted onDecember 11, 2013
by l33tdawg

Singapore's central bank has called on financial institutions to tighten up cybersecurity after a database on elite customers of Standard Chartered Bank was compromised.

Police confirmed yesterday that information on private-banking clients of the British lender had been found in the laptop of a Singaporean man charged with hacking the parliamentary district website of Prime Minister Lee Hsien Loong.

Suspected 'Messiah' hacker charged in court

posted onNovember 12, 2013
by l33tdawg

The man suspected of hacking into Government websites under the moniker “The Messiah” was charged in the Subordinate Courts under the Computer Misuse and Cybersecurity Act today (Nov 12).

The 35-year-old Singaporean was charged with carrying out “unauthorised modifications” to websites here, including adding an image of Guy Fawkes mask and messages signed off as “The Messiah”, using a computer in Kuala Lumpur.

Misinformation only emboldens hacker groups into targeting easier prey for better publicity

posted onOctober 21, 2013
by l33tdawg

THERE’S that old saying, about no matter how tight your mosquito net is, one always gets through the mesh.
It is stuff like this that keeps information security professionals up at night: No matter how secure a system is, a skilful enough hacker with the time and resources on hand, will generally be able to break through. The point, some would say, is to make it not worth his or her while, so that the hacker would go on and pick on less troublesome targets.