hiveleak attacks UCSI University

Incident Date:

March 22, 2022

World map



hiveleak attacks UCSI University


UCSI University




56000 Cheras, Malaysia

Federal Territory of Kuala Lumpur, Malaysia

First Reported

March 22, 2022

UCSI University Suffers Ransomware Attack by Hiveleak Group

UCSI University, a private university in Malaysia, has been targeted by the ransomware group Hiveleak. The attack was announced on the group's dark web leak site, and the victim's website is UCSI University. UCSI University operates in the Education sector and has been hit by a ransomware attack, which has encrypted some of their data.

Victim's Background

UCSI University is known for its commitment to fostering talent in both the healthcare and hospitality sectors. They have recently launched the Post-Basic Critical Care Nursing (CCN) Programme and the School of Hospitality and Tourism Management (SHTM) at their Springhill campus. The university has also been involved in initiatives to support startups and has established partnerships with organizations like Tencent Cloud International.

Size and Vulnerabilities

The size of UCSI University is not explicitly mentioned in the search results. However, the university has been targeted by the Hiveleak ransomware group, which suggests that they may have been considered a valuable target due to their operations in the Education sector.

The attack on UCSI University highlights the need for robust cybersecurity measures in the education sector. Ransomware attacks can cause significant disruption to operations and can result in the loss of valuable data. Organizations are encouraged to regularly back up their data offline and to implement strong security measures to prevent such attacks.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.