Thursday, June 1, 2023

Maxis Website Breached, Hacker Group claims responsibility

It appears that Maxis website at was breached, possibly last week. The intruder posted a note on their Facebook page claiming that they have managed to access all file directory at the website.

GaySec, the group which claims responsibility on the intrusion, says that they were merely testing Maxis website’s defensive system. While no Maxis/Hotlink customer database were revealed, the group questioned what if these personal data falls on wrong hands that are not responsible.

Maxis has yet to reply at the point of writing. Below are some of the details/screenshot revealed by the group: Server details:

Processor Architecture: x86
Number Of Processors: 4
Processor Identifier: x86 Family 15 Model 4 Stepping 3, GenuineIntel
Processor Level: 15
Processor Revision: 0403

Operating System Information:
Sistem OS: Windows_NT
Server Software: Microsoft-IIS/6.0
Cmd Path: C:\WINDOWS\system32\cmd.exe
Public Paths: C:\Program Files\HP\NCU;C:\Program Files\Support Tools\;C:\oracle\ora92\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;C:\Program Files\Microsoft Network Monitor 3\;C:\Program Files\Microsoft SQL Server\80\Tools\BINN;D:\Program Files\Symantec\Critical System Protection\Agent\IPS\bin;D:\Tivoli\ITM\bin;D:\Tivoli\ITM\bin\dll;D:\Tivoli\ITM\TMAITM6;D:\Tivoli\ITM\InstallITM;

Executables: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.VBS

System Drive: C:System Root: C:\WINDOWS
System32 Path: c:\windows\system32\inetsrv root directory:

(Click image for larger view)

[Source]– Via (Amanz)

Kugan is the co-founder of MalaysianWireless. He has been observing the mobile industry since 2003. Connect with him on Twitter: @scamboy

Related Articles


Stay Connected with Us


Hosted at AIMS Data Centre


Latest Articles