Ransomware victim disclosure
← All victimsAdnan Sundra & Low
Claimed by direwolf · listed 5 months ago
Status timeline
- Listed
Dec 22, 2025
- Data leaked
At a glance
- Group
- direwolf
- Status
- Data leaked
- Country
- MY
- Sector
- Financial Services
- Listed on leak site
- Dec 22, 2025
About the victim
AI dossier — public-source company profileAdnan Sundra & Low is a Malaysian law firm headquartered in Kuala Lumpur, offering a broad range of legal services including corporate banking, debt capital markets, mergers and acquisitions, Islamic finance, real estate, litigation, and arbitration. The firm operates foreign desks covering China, India, Japan, Korea, and Southeast Asia, indicating a significant international practice. It has a secondary branch at The MET Corporate Towers, also in Kuala Lumpur.
- Industry
- Legal Services & Law Firm
- Address
- Level 25, Menara Etiqa, No. 3, Jalan Bangsar Utama 1, 59000 Kuala Lumpur, Malaysia
Attack summary
Severity: high — Data has been published by the threat actor for a law firm, which routinely holds highly sensitive and privileged client information including corporate transactions, financial dealings, and personal data. The publication of such data constitutes confirmed exfiltration of significant business and potentially regulated data (personal data subject to Malaysia's PDPA), warranting a high severity rating.The direwolf ransomware group claims to have compromised Adnan Sundra & Low and has published data (disclosed status: data_published), though the specific volume of exfiltrated data and whether encryption occurred are not detailed in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Client legal files
- Confidential legal correspondence
- Corporate transaction documents
- Personal data of clients and staff
- Financial records
- Contracts and agreements
What the group claims
Law Firms, Legal Services
Sources
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
