Ransomware victim disclosure
← All victimsJesin Group
Claimed by lamashtu · listed 1 month ago
Status timeline
- Listed
Apr 20, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileJesin Group is one of Northern Malaysia's leading property developers, operating for over 50 years with a strong presence in the Kedah region. The company specialises in residential, commercial, and industrial real estate development, construction, and asset management. It has built approximately 2,967 properties across 360 acres and is a pioneer of the Industrialised Building System (IBS) in Malaysia.
- Industry
- Residential & Commercial Property Development
- Address
- No. 25, 26 & 27, Jalan Petani, 08000 Sungai Petani, Kedah Darul Aman, Malaysia
Attack summary
Severity: high — The status is 'data_published', meaning the group has already released stolen data publicly. As a property developer, this likely involves customer PII (buyers, financial records, contracts) and sensitive business data, constituting confirmed exfiltration with published proof.The Lamashtu ransomware group claims an attack on Jesin Group with data published (disclosed status: data_published), though the leak post does not specify whether encryption, exfiltration, or both occurred, and no ransom amount or data volume is stated.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Property development records
- Customer information
- Internal company files
What the group claims
Jesin Group is a prominent property developer in Northern Malaysia with over 50 years of experience, specializing in residential and commercial real estate development, construction, and asset management.
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
