Trending

HomeBlog
NETFILIM RANSOMWARE OPERATORS PUBLISHES THE DATA LEAK PART 4-5 OF MAS HOLDINGS, SOUTH ASIA’S LARGEST MANUFACTURER OF LINGERIE

NETFILIM RANSOMWARE OPERATORS PUBLISHES THE DATA LEAK PART 4-5 OF MAS HOLDINGS, SOUTH ASIA’S LARGEST MANUFACTURER OF LINGERIE

For the consecutive fourth time, Netfilim ransomware operators publish data leak of MAS Holdings. Earlier to this, they published the data leak part 1, part 2, and part 3 of the company, which were verified and been reported by the Cyble Research Team.  

MAS Holdings is South Asia’s largest manufacturer of lingerie. MAS Holdings began as an intimate apparel manufacturer and later diversified into sportswear, performance wear, and swimwear. MAS Holdings has 53 manufacturing facilities in 17 countries employing over 93,000 people globally. MAS Holdings’ current portfolio encompasses businesses in IT, brands, and industrial parks. The company reported revenue of USD 2Billion in 2018 and has over 99,000 employees.

As claimed before by the Cyble Research Team, the Netfilim ransomware operators leaked the fourth part of the company’s data. Based on this data leak it seems that once again the company refused to accept the terms of the ransomware operators. Due to the refusal, the ransomware operators chose to leak the fourth part of the data. Below is the message been posted by Netfilim ransomware operators-:

The Cyble researchers have verified the leak of around 5GB. The data leak includes multiple confidential corporate documents such as the company’s bank reconciliation statements, Debit & Credit notes, Sales forecasts documents, fixed assets record details, and much more. Below is the snapshot of few files from the directory listing being leaked by the Netfilim ransomware operators.

Directory Listing of Data Leak Part 4
Directory Listing of Data Leak Part 5

Once again, it is expected that more data leaks of MAS holdings may be published soon, if no action is been taken by the company.

We recommend people to:

report-ad-banner
  • Never share personal information, including financial information over the phone, email or SMSs
  • Use strong passwords and enforce multi-factor authentication where possible
  • Regularly monitor your financial transaction, if you notice any suspicious transaction, contact your bank immediately.
  • Turn-on automatic software update feature on your computer, mobile and other connected devices where possible and pragmatic
  • Use a reputed anti-virus and internet security software package on your connected devices including PC, Laptop, Mobile

People who are concerned about their exposure in darkweb can register at AmiBreached.com to ascertain their exposure.

About Cyble:

Cyble is a US-based cyber threat intelligence company with the express mission to provide organizations with real-time views of their supply chain cyber threats and risks.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading