It appears that Maxis website at www.maxis.com.my was breached, possibly last week. The intruder posted a note on their Facebook page claiming that they have managed to access all file directory at the website.
GaySec, the group which claims responsibility on the intrusion, says that they were merely testing Maxis website’s defensive system. While no Maxis/Hotlink customer database were revealed, the group questioned what if these personal data falls on wrong hands that are not responsible.
Maxis has yet to reply at the point of writing. Below are some of the details/screenshot revealed by the group:
Maxis.com.my Server details:
Processor Architecture: x86
Number Of Processors: 4
Processor Identifier: x86 Family 15 Model 4 Stepping 3, GenuineIntel
Processor Level: 15
Processor Revision: 0403Operating System Information:
IP: 172.16.x.xxx
Sistem OS: Windows_NT
Server Software: Microsoft-IIS/6.0
Cmd Path: C:\WINDOWS\system32\cmd.exe
Public Paths: C:\Program Files\HP\NCU;C:\Program Files\Support Tools\;C:\oracle\ora92\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;C:\Program Files\Microsoft Network Monitor 3\;C:\Program Files\Microsoft SQL Server\80\Tools\BINN;D:\Program Files\Symantec\Critical System Protection\Agent\IPS\bin;D:\Tivoli\ITM\bin;D:\Tivoli\ITM\bin\dll;D:\Tivoli\ITM\TMAITM6;D:\Tivoli\ITM\InstallITM;Executables: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.VBS
Prompt:
System Drive: C:System Root: C:\WINDOWS
System32 Path: c:\windows\system32\inetsrv
Maxis.com.my root directory:
(Click image for larger view)
[Source]– Via (Amanz)