Ransomware victim disclosure
← All victimsGaruda Indonesia
Claimed by Mallox · listed 3 years ago
Status timeline
- Listed
Jul 9, 2023
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileGaruda Indonesia is the national flag carrier airline of Indonesia, headquartered at Soekarno-Hatta International Airport in Tangerang. The airline operates domestic and international routes across Asia, the Middle East, Australia, and Europe, serving millions of passengers annually. It is a state-owned enterprise and a member of the SkyTeam airline alliance.
- Industry
- Commercial Aviation & Air Transportation
- Address
- Management Building, Soekarno-Hatta International Airport, Tangerang, Banten 19120, Indonesia
- Employees
- 7000
- Founded
- 1949
Attack summary
Severity: high — Garuda Indonesia is a national flag carrier and state-owned enterprise handling large volumes of passenger PII, financial, and operational data. A confirmed data_published status indicates actual exfiltration and release, representing significant exposure for a critical transportation operator, though the specific data types and scale cannot be verified from the available post.The Mallox ransomware group claims an attack against Garuda Indonesia, with the disclosure status recorded as data_published, suggesting exfiltration and/or publication of company data. No specific data volume or ransom demand was stated in the captured post.
Data the group says was taken
AI dossier — extracted from the leak post- Company data (type unspecified)
Sources
- Victim sitegaruda-indonesia.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
