Ransomware victim disclosure
← All victimsAirAsia Group
Claimed by Daixin · listed 4 years ago
Status timeline
- Listed
Nov 19, 2022
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileAirAsia Group is a Malaysian multinational low-cost airline headquartered near Kuala Lumpur, Malaysia. It is the largest airline in Malaysia by fleet size and number of destinations, operating scheduled domestic and international flights to more than 165 destinations across Asia and beyond. The group operates multiple airline subsidiaries across Southeast Asia and South Asia.
- Industry
- Low-Cost Airline & Aviation Services
- Address
- RedQ, Jalan Pekeliling 5, Lapangan Terbang Antarabangsa Kuala Lumpur, 64000 KLIA, Selangor, Malaysia
- Employees
- 10000+
- Founded
- 1993
Attack summary
Severity: critical — AirAsia is a major international airline with millions of passengers; confirmed data publication by Daixin includes large-scale PII of both passengers and employees, constituting regulated personal data exfiltration at significant scale.The Daixin ransomware group claimed an attack on AirAsia Group and published data, indicating confirmed exfiltration of passenger and employee data including personally identifiable information. The disclosed status of 'data_published' indicates stolen data was released on Daixin's leak site.
Data the group says was taken
AI dossier — extracted from the leak post- Passenger PII records
- Employee personal data
- Booking and reservation information
- Internal company documents
What the group claims
AirAsia is a Malaysian multinational low-cost airline headquartered near Kuala Lumpur, Malaysia. It is the largest airline in Malaysia by fleet size and destinations. AirAsia operates scheduled domestic and international flights to more than 165 destinations.
Source
Indexed 4 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
