Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      In-House vs. Outsource Node.js Development Teams: 9 Key Differences for the C-Suite (2025)

      July 19, 2025

      Why Non-Native Content Designers Improve Global UX

      July 18, 2025

      DevOps won’t scale without platform engineering and here’s why your teams are still stuck

      July 18, 2025

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      I ditched my Bluetooth speakers for this slick turntable – and it’s more practical than I thought

      July 19, 2025

      This split keyboard offers deep customization – if you’re willing to go all in

      July 19, 2025

      I spoke with an AI version of myself, thanks to Hume’s free tool – how to try it

      July 19, 2025

      I took a walk with Meta’s new Oakley smart glasses – they beat my Ray-Bans in every way

      July 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 19, 2025
      Recent

      The details of TC39’s last meeting

      July 19, 2025

      Simple wrapper for Chrome’s built-in local LLM (Gemini Nano)

      July 19, 2025

      Online Examination System using PHP and MySQL

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Top 7 Computer Performance Test Tools Online (Free & Fast)

      July 19, 2025
      Recent

      Top 7 Computer Performance Test Tools Online (Free & Fast)

      July 19, 2025

      10 Best Windows 11 Encryption Software

      July 19, 2025

      Google Chrome Is Testing Dynamic Country Detection for Region-Specific Features

      July 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»It’s Official: Thailand’s Labour Ministry Breached, Backups Erased, Network in Ruins

    It’s Official: Thailand’s Labour Ministry Breached, Backups Erased, Network in Ruins

    July 18, 2025

    Thailand Ministry of Labour cyberattack Update

    Thailand Ministry of Labour cyberattack has intensified as new revelations came which indicates that a planned data breach impacted the Ministry’s digital infrastructure. What was initially reported as a defacement of the Ministry’s website has now been confirmed as a full scale cyberattack on Thailand’s Ministry of Labour that compromised internal systems, encrypted critical data, and disrupted government operations.

    Boonsong Tapchaiyut, Permanent Secretary of the Ministry of Labour, had confirmed that on the morning of July 17, 2025, hackers had defaced the Ministry’s official website, replacing its homepage with a message announcing their successful attack.

    Further, Boonsong emphasized that the data breach was limited to visible content and that the internal servers and data repositories remained secure.

    However, recent developments have painted an extremely different picture.

    Hacker Group ‘Devman’ Claims Responsibility

    A threat actor identifying as Devman had claimed responsibility for Thailand Ministry of Labour cyberattack through a post on a dark web blog. According to the post, the group had maintained undetected access to the Ministry’s network for more than 43 days, infiltrating Active Directory servers and multiple Linux systems during that period.

    The group claims to have exfiltrated over 300 GB of sensitive data, encrypted approximately 2,000 laptops, and taken control of 98 Linux servers and over 50 Windows servers. Moreover, they state that they have completely wiped the Active Directory environment and destroyed all tape backups, rendering data recovery almost impossible.

    Website Defacement After Thailand Ministry of Labour cyberattack

    Thailand Ministry of Labour cyberattack became publicly known after the Ministry’s website was defaced with a chilling message:

    “THIS IS NOT JUST THE WEBSITE. WHAT YOU WITNESS HERE IS PART OF OUR COORDINATED ATTACK, AIMED AT CRIPPLING THIS MINISTRY.”

    Although the message was removed shortly afterward and the website was restored using backup files, the deeper implications of the cyberattack are now emerging.

    Boonsong stated that immediate actions were taken by the Ministry’s Information and Communication Technology Center (ICTC) to shut down the compromised system, remove the malicious files, and restore web functionality using backups. New security measures were also implemented, including closing access points, and resetting all usernames and passwords.

    He further clarified that the circulating claim of a $15 million loss was inaccurate and that damage assessments were still ongoing.

    Full System Compromise Confirmed

    In an update on Thailand Ministry of Labour cyberattack issued late July 17, the Ministry acknowledged that their internal systems had been compromised and encrypted, with no recovery possible without the decryption key.

    An internal error during IT operations has made short-term recovery unlikely, leaving the Ministry’s infrastructure completely down for the time being due to Thailand Ministry of Labour cyberattack.

    “The severity of the situation has elevated. We are treating this matter with utmost urgency and will provide more updates as we work through the crisis,” read the official statement.

    Thailand Ministry of Labour cyberattack Minister
    Boonsong Tapchaiyut, Permanent Secretary of the Ministry of Labor (Source: Official Website)

    Legal Action and Cybercrime Report Filed

    Boonsong confirmed that the Ministry has filed a report with the Cyber Police, urging legal action against the perpetrators under the Computer Crime Act, citing reputational damage and the entry of false data into a government system.

    “I’ve instructed the legal department to examine all possible avenues. This is not just a technical incident — it is a violation of national security and law,” said Boonsong.

    What’s Next?

    The Ministry of Labour is currently working with external cybersecurity firms, law enforcement, and national cyber defense agencies to determine the full extent of the damage of Thailand Ministry of Labour cyberattack and prevent future incidents. Recovery efforts are underway, though the destruction of backups and encryption of internal systems present a formidable challenge.

    As this story continues to unfold, The Cyber Express will monitor updates on the Thailand Ministry of Labour cyberattack, including any official responses, confirmations, or public statements from affected agencies.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleScanception Exposed: New QR Code Attack Campaign Exploits Unmonitored Mobile Access
    Next Article Top 10 Threat Intelligence Platforms in ANZ: 2025 Guide for Security Teams

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 19, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5374 – PHPGurukul Online Birth Certificate System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Cisco fixes max severity IOS XE flaw letting attackers hijack devices

    Security

    CISO’s Guide To Web Privacy Validation And Why It’s Important

    Development

    CVE-2025-37994 – “Linux Kernel USB TypeC UCSI NULL Pointer Access Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-6511 – Netgear EX6150 Stack-Based Buffer Overflow Vulnerability

    June 23, 2025

    CVE ID : CVE-2025-6511

    Published : June 23, 2025, 5:15 p.m. | 1 hour, 9 minutes ago

    Description : A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Meta, Facebook, and Instagram AI is coming for EU data — Here’s what you need to know (and how to opt out)

    April 27, 2025

    A Customer-Centric Shoptalk Spring 2025

    April 3, 2025

    DistroWatch Weekly, Issue 1116

    April 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.