Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025

      What You Need to Know About CSS Color Interpolation

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
      Recent

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025

      How to create Google Gemini AI component in Total.js Flow

      September 6, 2025

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025
      Recent

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»It’s Official: Thailand’s Labour Ministry Breached, Backups Erased, Network in Ruins

    It’s Official: Thailand’s Labour Ministry Breached, Backups Erased, Network in Ruins

    July 18, 2025

    Thailand Ministry of Labour cyberattack Update

    Thailand Ministry of Labour cyberattack has intensified as new revelations came which indicates that a planned data breach impacted the Ministry’s digital infrastructure. What was initially reported as a defacement of the Ministry’s website has now been confirmed as a full scale cyberattack on Thailand’s Ministry of Labour that compromised internal systems, encrypted critical data, and disrupted government operations.

    Boonsong Tapchaiyut, Permanent Secretary of the Ministry of Labour, had confirmed that on the morning of July 17, 2025, hackers had defaced the Ministry’s official website, replacing its homepage with a message announcing their successful attack.

    Further, Boonsong emphasized that the data breach was limited to visible content and that the internal servers and data repositories remained secure.

    However, recent developments have painted an extremely different picture.

    Hacker Group ‘Devman’ Claims Responsibility

    A threat actor identifying as Devman had claimed responsibility for Thailand Ministry of Labour cyberattack through a post on a dark web blog. According to the post, the group had maintained undetected access to the Ministry’s network for more than 43 days, infiltrating Active Directory servers and multiple Linux systems during that period.

    The group claims to have exfiltrated over 300 GB of sensitive data, encrypted approximately 2,000 laptops, and taken control of 98 Linux servers and over 50 Windows servers. Moreover, they state that they have completely wiped the Active Directory environment and destroyed all tape backups, rendering data recovery almost impossible.

    Website Defacement After Thailand Ministry of Labour cyberattack

    Thailand Ministry of Labour cyberattack became publicly known after the Ministry’s website was defaced with a chilling message:

    “THIS IS NOT JUST THE WEBSITE. WHAT YOU WITNESS HERE IS PART OF OUR COORDINATED ATTACK, AIMED AT CRIPPLING THIS MINISTRY.”

    Although the message was removed shortly afterward and the website was restored using backup files, the deeper implications of the cyberattack are now emerging.

    Boonsong stated that immediate actions were taken by the Ministry’s Information and Communication Technology Center (ICTC) to shut down the compromised system, remove the malicious files, and restore web functionality using backups. New security measures were also implemented, including closing access points, and resetting all usernames and passwords.

    He further clarified that the circulating claim of a $15 million loss was inaccurate and that damage assessments were still ongoing.

    Full System Compromise Confirmed

    In an update on Thailand Ministry of Labour cyberattack issued late July 17, the Ministry acknowledged that their internal systems had been compromised and encrypted, with no recovery possible without the decryption key.

    An internal error during IT operations has made short-term recovery unlikely, leaving the Ministry’s infrastructure completely down for the time being due to Thailand Ministry of Labour cyberattack.

    “The severity of the situation has elevated. We are treating this matter with utmost urgency and will provide more updates as we work through the crisis,” read the official statement.

    Thailand Ministry of Labour cyberattack Minister
    Boonsong Tapchaiyut, Permanent Secretary of the Ministry of Labor (Source: Official Website)

    Legal Action and Cybercrime Report Filed

    Boonsong confirmed that the Ministry has filed a report with the Cyber Police, urging legal action against the perpetrators under the Computer Crime Act, citing reputational damage and the entry of false data into a government system.

    “I’ve instructed the legal department to examine all possible avenues. This is not just a technical incident — it is a violation of national security and law,” said Boonsong.

    What’s Next?

    The Ministry of Labour is currently working with external cybersecurity firms, law enforcement, and national cyber defense agencies to determine the full extent of the damage of Thailand Ministry of Labour cyberattack and prevent future incidents. Recovery efforts are underway, though the destruction of backups and encryption of internal systems present a formidable challenge.

    As this story continues to unfold, The Cyber Express will monitor updates on the Thailand Ministry of Labour cyberattack, including any official responses, confirmations, or public statements from affected agencies.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleScanception Exposed: New QR Code Attack Campaign Exploits Unmonitored Mobile Access
    Next Article Top 10 Threat Intelligence Platforms in ANZ: 2025 Guide for Security Teams

    Related Posts

    Development

    How to focus on building your skills when everything’s so distracting with Ania Kubów [Podcast #187]

    September 6, 2025
    Development

    Introducing freeCodeCamp Daily Python and JavaScript Challenges – Solve a New Programming Puzzle Every Day

    September 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-44893 – Fortinet Web Application Firewall Stack Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    bookmarkmenu offers bookmark storage using the menu back end

    Linux

    CVE-2025-6293 – Code-projects Hostel Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-56156 – Halo File Type Validation Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Machine Learning

    Detect hallucinations for RAG-based systems

    May 17, 2025

    With the rise of generative AI and knowledge extraction in AI systems, Retrieval Augmented Generation…

    Got ChatGPT Plus? You can record and summarize meetings on a Mac now – here’s how

    July 17, 2025

    Last Week in AI #311 – Claude 4 System Card, more Veo 3, Flux Kontext

    June 2, 2025

    CVE-2025-5247 – Gowabby HFish Remote Authentication Bypass

    May 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.