Thursday, June 1, 2023

Maxis Website Breached, Hacker Group claims responsibility

It appears that Maxis website at www.maxis.com.my was breached, possibly last week. The intruder posted a note on their Facebook page claiming that they have managed to access all file directory at the website.

GaySec, the group which claims responsibility on the intrusion, says that they were merely testing Maxis website’s defensive system. While no Maxis/Hotlink customer database were revealed, the group questioned what if these personal data falls on wrong hands that are not responsible.

Maxis has yet to reply at the point of writing. Below are some of the details/screenshot revealed by the group:

Maxis.com.my Server details:

Processor Architecture: x86
Number Of Processors: 4
Processor Identifier: x86 Family 15 Model 4 Stepping 3, GenuineIntel
Processor Level: 15
Processor Revision: 0403

Operating System Information:
IP: 172.16.x.xxx
Sistem OS: Windows_NT
Server Software: Microsoft-IIS/6.0
Cmd Path: C:\WINDOWS\system32\cmd.exe
Public Paths: C:\Program Files\HP\NCU;C:\Program Files\Support Tools\;C:\oracle\ora92\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;C:\Program Files\Microsoft Network Monitor 3\;C:\Program Files\Microsoft SQL Server\80\Tools\BINN;D:\Program Files\Symantec\Critical System Protection\Agent\IPS\bin;D:\Tivoli\ITM\bin;D:\Tivoli\ITM\bin\dll;D:\Tivoli\ITM\TMAITM6;D:\Tivoli\ITM\InstallITM;

Executables: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.VBS

Prompt:
System Drive: C:System Root: C:\WINDOWS
System32 Path: c:\windows\system32\inetsrv

Maxis.com.my root directory:

(Click image for larger view)

[Source]– Via (Amanz)

Kugan
Kugan is the co-founder of MalaysianWireless. He has been observing the mobile industry since 2003. Connect with him on Twitter: @scamboy

Related Articles

1 COMMENT

Stay Connected with Us

53,803FansLike
689FollowersFollow

Hosted at AIMS Data Centre

aims-logo

Latest Articles