Skip to content
  • Case Studies
  • Cybersecurity Readiness Assessment
simply data logo
  • About
    • About Us
    • Innovation
      • SD Platform Overview
    • Certifications & Awards
  • Our Services
    • CyberSecurity Services
      • DFIR (Digital Forensics and Incident Response)
      • Compromise Assessment
      • Security Operations Center (SOC) Managed Service
        • SD-Cyber Deception
        • Threat Intelligence
        • Managed Detection and Response (MDR)
        • Cloud Security Posture Management (CSPM)
        • Web Defacement Monitoring
        • In-house Automation Script Development
        • Advanced Malware Analysis & Threat Intelligence
        • Office 365 Monitoring
        • SaaS Monitoring
      • Extended Threat Intelligence
        • Dark Web Monitoring
        • Attack Surface Management
        • Cyber Risk Management
      • Security Posture Assessment (SPA)
      • VAPT & Penetration Testing
      • Network & Security Configuration Audit & Hardening
      • Phishing Email Simulation
    • Managed Network & Security Services
    • Application Performance Monitoring (APM)
      • APM as a Service (APMaaS)
      • Cloud Monitoring
      • Database Performance Monitoring
      • Web Application Monitoring
      • Synthetic Testing Monitoring
      • Real User Monitoring (RUM)
      • Application Stress Test / Load Test Services
    • Consultancy Services
      • NCSB Risk Assessment
      • Security BluePrint™ Consultancy Services
    • Application Framework
      • Safety Net Core System Framework
    CyberSecurity Services
    • VAPT & Penetration Testing
    • Cyber - 911 - DFIR Services
    • Compromise Assessment
    • Security Operations Center (SOC)
    • Extended Threat Intelligence
    • Security Posture Assessment (SPA) Services
    • Network & Security Configuration Audit & Hardening
    • Phishing Email Simulation
    Managed Network & Security Services
    • Managed Network & Security Services
    Consultancy Services
    • NCSB Risk Assessment
    • Security BluePrint™ Consultancy Services
    Application Framework 
    • Safety Net Core System Framework
    Application Performance Monitoring
    • APM as a Service (APMaaS)
    • Cloud Monitoring
    • Database Performance Monitoring
    • Web Application Monitoring
    • Synthetic Testing Monitoring
    • Real User Monitoring (RUM)
    • Stress Test / Load Test – Performance Assessment

    Not Sure What Security Threats Your Organization is Facing?

    We can help. Contact us now for a free consultation and protect your business from potential risks.

    Contact Us
  • Technology Vendor Partners
  • Blog & News
  • Contact
    • Contact Us
    • Become a Simply Data Partner

Under Attack?

Submit your message through our contact form or call us at +603 5886 2714.

    Latest News

    Malaysia Threat Report: 2024 Cybersecurity Insights

    March 26, 2025
    Malaysia Threat Report 2024 Cybersecurity Insights

    Home – Malaysia Threat Report: 2024 Cybersecurity Insights

    The Malaysia cybersecurity threat report 2024 highlights a year of escalating attacks against businesses across all sectors. Understanding the threat landscape is essential for Malaysian organisations seeking to strengthen their defences and make informed security investment decisions.

    In today’s rapidly evolving digital landscape, cyber threats continue to pose significant risks to businesses of all sizes. With the increasing complexity of cyberattacks, traditional security measures are no longer sufficient. Organizations must adopt proactive threat intelligence solutions that not only detect threats but also take immediate action. Simply Data is at the forefront of cybersecurity innovation, offering an advanced Threat Intelligence – Integrated SOAR Automation Blocking solution that ensures robust protection for enterprises.

    Key Insights from the 2024 Malaysia Threat Report

    Our latest Malaysia Threat Report provides an in-depth analysis of cybersecurity incidents, revealing alarming trends in the cyber threat landscape. In 2024 alone, Simply Data collected and analyzed 71,830,607,531 logs, identifying key attack patterns and vulnerabilities exploited by malicious actors.

    Executive Summary

    The report highlights a significant rise in ransomware attacks, phishing campaigns, and targeted intrusions affecting organizations across multiple sectors. Notably, Malaysia has seen a surge in APT (Advanced Persistent Threat) groupsleveraging zero-day vulnerabilities to infiltrate critical infrastructure.

    The report identifies threat actors such as FLAX TYPHOON, SIDEWINDER, RIPPERSEC, GAMAREDON, HUNTERS, RANSOMHUB, RHYSIDA, and BLACKCAT, who have been actively targeting financial institutions, logistics, and education sectors in Malaysia. These groups employ sophisticated techniques like credential theft, supply chain attacks, and advanced evasion tactics. Additionally, the LockBit ransomware group has been responsible for several high-profile ransomware incidents, crippling organizations through double extortion tactics—encrypting data and threatening to release stolen information publicly.

    Another critical finding is the rise in phishing-as-a-service (PhaaS) platforms, enabling cybercriminals to deploy large-scale credential-harvesting campaigns with minimal effort. The emergence of deepfake social engineering tactics further complicates security defenses, requiring businesses to enhance their detection mechanisms.

    Top 5 Cybersecurity Incidents

    Our research recorded a substantial rise in cybersecurity incidents across Malaysia in 2024. The report details multiple high-impact cases, including:

    1. Unauthorized Access via Brute Force Attacks – Attackers exploited weak passwords and credential stuffing techniques, leading to significant breaches.
    2. Ransomware Infections via Phishing Emails – Organizations fell victim to sophisticated phishing campaigns delivering ransomware payloads.
    3. Supply Chain Attacks – Malware was injected into widely used third-party software updates, compromising hundreds of businesses.
    4. Data Destruction & Wiper Malware Attacks – Malicious actors deployed destructive malware to erase critical business data.
    5. Cloud Infrastructure Exploitation – Attackers took advantage of misconfigured public cloud environments, leading to data leaks and account takeovers.

    Top 3 MITRE Tactics & Techniques

    The report highlights the most commonly used MITRE ATT&CK techniques observed in attacks against Malaysian businesses:

    • T1110 (Brute Force Attacks) – Cybercriminals attempted to gain access by guessing user credentials.
    • T1665 (Hide Infrastructure) – Adversaries concealed malicious command-and-control (C2) communications to avoid detection.
    • T1485 (Data Destruction) – Attackers deployed malware to delete critical data, disrupting business operations.

    Threat Intelligence by Countries

    The report reveals the top 5 countries from which cyberattacks targeting Malaysia originated:

    1. United States – Hosting a significant number of compromised servers used in attacks.
    2. China – Linked to state-sponsored APT activities.
    3. Great Britain – Origin of multiple cybercrime operations.
    4. South Korea – Emerging hub for cyber exploitation activities.
    5. Russia – A major source of ransomware and cyber extortion campaigns.

    Key Risks Identified in 2024

    The primary risks affecting organizations in Malaysia include:

    Download Full Report





      Stay Ahead with Simply Data

      Cyber threats are becoming more sophisticated, and organizations must be proactive in their defense strategies. With Simply Data’s Threat Intelligence – Integrated SOAR Automation Blocking, businesses can safeguard their critical assets, maintain compliance, and ensure uninterrupted operations.

      Want to learn more about how Simply Data can protect your business? Contact us today to schedule a consultation or subscribe to our quarterly Cybersecurity Intelligence Newsletter for the latest threat updates.

      Resources and Further Reading on Malaysia Cybersecurity Threat Report 2024

      For organisations looking to strengthen their cybersecurity posture, the following authoritative resources provide valuable guidance: CISA Cyber Threats and Advisories | MITRE ATT&CK Framework.

      Simply Data offers a full suite of cybersecurity and technology solutions tailored for Malaysian businesses. Explore our services: SOC-as-a-Service | Cybersecurity Case Studies. Ready to get started? Contact our cybersecurity experts for a free consultation today.

      Frequently Asked Questions

      1. What were the most common cybersecurity incidents in Malaysia in 2024?

      The report identifies five high-impact incident types that surged in 2024:
      – Brute Force Attacks: Exploiting weak passwords to gain unauthorized access.
      – Ransomware via Phishing: Using sophisticated emails to deliver malicious payloads.
      – Supply Chain Attacks: Injecting malware into third-party software updates.
      – Data Destruction: Deploying “wiper” malware to intentionally erase business data.
      – Cloud Exploitation: Targeting misconfigured public cloud environments.

      2. Which industries in Malaysia are being targeted by Advanced Persistent Threat (APT) groups?

      The report highlights that APT groups (such as FLAX TYPHOON and SIDEWINDER) are actively targeting financial institutions, logistics, and education sectors. These groups often leverage zero-day vulnerabilities to infiltrate critical infrastructure.

      3. What is “Double Extortion” in the context of ransomware?

      The report mentions that groups like LockBit use double extortion tactics. This means they do not just encrypt an organization’s data to demand a ransom, they also threaten to release stolen sensitive information publicly if the payment is not made, increasing the pressure on victims.

      4. From which countries do most cyberattacks against Malaysia originate?

      According to Simply Data’s threat intelligence, the top 5 countries serving as sources for cyberattacks targeting Malaysia are the United States, China, Great Britain, South Korea, and Russia. These locations host compromised servers or serve as hubs for state-sponsored and criminal operations.

      5. How are “Phishing-as-a-Service” (PhaaS) and deepfakes changing the threat landscape?

      Cybercrime has become more accessible through PhaaS platforms, which allow low-skilled attackers to launch large-scale credential-harvesting campaigns. Additionally, the emergence of deepfake social engineering has made it harder for employees to distinguish between legitimate communications and fraudulent ones, requiring more advanced detection mechanisms.

      • Cyber Threats
      • cybersecurity-malaysia
      • Malaysia
      • Ransomware
      • Threat Report
      • threat-intelligence

      Post navigation

      Previous
      Next

      Search

      Categories

      • Announcements (8)
      • Cybersecurity Tips (38)
      • Industry Insights & Trends (3)
      • Latest News (2)

      Recent posts

      • Why Your Business Needs Real Time Security Intelligence to Stay Ahead of Cyber Threats
        Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats
      • blog image 2 vapt fixed
        Penetration Testing Malaysia: What Is VAPT, Why Your Business Needs It, and What to Look For in a Provider
      • blog image 1 pdpa fixed
        PDPA Malaysia 2024 Amendment: What Every Malaysian Business Must Do Before You Get Fined

      Tags

      2026 Trends AI Threats apm Certification cloud-security Company News Compliance Cost-Benefit Analysis Credential Compromise cyber-security-act cybersecurity-malaysia Cybersecurity News Cybersecurity Spending Cyber Threats Dark Web DFIR Incident Response iso27001 Malaysia Malaysia Cybersecurity 2025 Managed Services MITRE ATT&CK nacsa Network Security PDPA penetration-testing Ransomware ROI SIEM SME Budget SME Security soc threat-intelligence Threat Report vapt Web Application Security

      Related posts

      Why Your Business Needs Real Time Security Intelligence to Stay Ahead of Cyber Threats
      Cybersecurity Tips

      Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats

      March 1, 2026

      Home – Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats In today’s interconnected world, businesses are under constant threat from cybercriminals looking to exploit vulnerabilities in digital infrastructure. To stay ahead, organizations must invest in real-time security intelligence, a critical aspect of a Security Operations Center (SOC). Simply Data’s Threat […]

      blog image 2 vapt fixed
      Cybersecurity Tips

      Penetration Testing Malaysia: What Is VAPT, Why Your Business Needs It, and What to Look For in a Provider

      March 1, 2026

      Penetration testing in Malaysia is now a regulatory requirement for financial institutions and a best practice for all businesses. Learn what VAPT covers, what NACSA and BNM RMiT require, and how to choose a CREST-certified provider.

      blog image 1 pdpa fixed
      Cybersecurity Tips

      PDPA Malaysia 2024 Amendment: What Every Malaysian Business Must Do Before You Get Fined

      March 1, 2026

      Malaysia’s PDPA Amendment Act 2024 introduces mandatory 72-hour breach notifications, fines up to RM1 million, and expanded data subject rights. Here’s what your business must do to stay compliant in 2025 and beyond.

      simply data logo

      Started in 2022, Simply Data is a CREST certified and NACSA Licensed Cyber Security company in Malaysia that provides cyber security services including Network & Security IT Managed Service, Security Operation Centre (SOC), Cyber Threat Intelligence, Vulnerability Assessment & Penetration Testing (VAPT) service, Application Performance Monitoring (APM) services, and more.n

      • B-03A-03, 3RD Floor, Block B Setiawalk, Persiaran Wawasan, Pusat Bandar Puchong, 47100 Puchong, Selangor
      • +603 5886 2714
      • contactus@simplydata.com.my
      Quick Links
      • Home
      • About Us
      • Innovation
      • Technology Vendor Partners
      • Blog / News
      • Career Opportunities
        Hiring
      • Become a Simply Data Partner
      • Cybersecurity Readiness Assessment
      • Malaysia CyberSecurity Act 854
      Application Framework 
      • Safety Net Core System Framework
      CyberSecurity Services
      • VAPT & Penetration Testing
      • Cyber - 911 - DFIR Services
      • Compromise Assessment
      • Security Operations Center (SOC)
      • Extended Threat Intelligence
      • Security Posture Assessment (SPA) Services
      • Network & Security Configuration Audit & Hardening
      • Phishing Email Simulation
      Managed Network & Security Services
      • Managed Network & Security Services
      Observability ApplicationnPerformance Monitoring
      • Observability APM as a Service
      • Cloud Monitoring
      • Database Performance Monitoring
      • Web Application Monitoring
      • Synthetic Testing Monitoring
      • Real User Monitoring
      • Stress Test / Load Test – Performance Assessment
      Consultancy Services
      • NCSB Risk Assessment
      • Security BluePrint™ Consultancy Services

      © 2025 Simply Data Sdn Bhd. All rights reserved.

      • Terms & Conditions
      • Data Protection & User Privacy
      • Privacy Policy
      • Cookie Policy