Malaysia PM says country rejected $10 million ransom demand after airport outages

Avatar

Computer outages at Malaysia’s Kuala Lumpur International Airport (KLIA) this weekend were attributed to a recent cyberattack, according to the country’s cybersecurity agency and aviation authority. 

Malaysia’s National Cyber Security Agency (NACSA) and Malaysia Airports released a joint statement Tuesday confirming that a cyberattack started causing disruptions on March 23.

“A comprehensive investigation was immediately launched to assess the nature and extent of the incident,” the officials said.

The statement emerged as Malaysian Prime Minister Anwar Ibrahim also confirmed the incident during a speech on Tuesday

Ibrahim said the attackers targeted Malaysia Airports Holdings Berhad (MAHB), the company that runs most of the country’s airports, and demanded a $10 million ransom.

“When I was informed about this … I did not wait five seconds. I said no,” he said, according to the South China Morning Post.

“There is no way this country will be safe if its leaders and system allow us to bow to ultimatums by criminals and traitors, be it from inside or outside the country.”

Ibrahim did not say what group is behind the attack and no group has taken credit for the incident. Officials did not respond to requests for comment about whether the incident involved ransomware.

Megat Zuhairy Megat Tajuddin, chief executive of NACSA, said in the statement on Tuesday that they received a report on the incident on March 23 and have been following the situation closely. Tajuddin claimed operations at the Kuala Lumpur airport “are not impacted.”

Senior Malaysia Airport administrators said they are working with other airport partners to “ensure that flight operations and passenger processing continue to operate normally.”

A former lawmaker slammed the government for not being more forthright about the situation, sharing photos from the airport showing workers writing out departure times on a dry erase board. 

“Was it true that the disruption In KLIA 1 & 2 was due to a ‘network equipment failure?’” said Wee Choo Keong, who has become a prominent critic of the government since leaving office. “Systems were down for more than 10 hours, affecting flight information displays, check-in counters, and baggage handling. This led to manual operations (e.g., whiteboards for communication). What a primitive ways [sic] in communications at an international airport?”

Over the last six months, ransomware gangs have damaged systems used at international airports in Seattle, Japan and Mexico.

CybercrimeGovernmentNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker

Next Post

Nearly $13 million stolen from Abracadabra Finance in crypto heist

Related Posts

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via bogus websites and fake browser updates, grants attackers full control over the victim's host, allowing them to monitor the device's screen in real-time, control the keyboard and mouse, upload and download
Avatar
Read More

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]

The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you can do to stay secure. Let’s turn awareness into action and keep one step ahead
Avatar
Read More

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments. NetSupport RAT Exploiting the ClickFix Technique In early 2025, threat actors began exploiting a technique
Avatar
Read More