[DEVMAN] – Ransomware Victim: www[.]heitech[.]com[.]my

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the DEVMAN Onion Dark Web Tor Blog page.

Ransomware group:
DEVMAN
Victim name:
WWW[.]HEITECH[.]COM[.]MY

AI Generated Summary of the Ransomware Leak Page

On November 4, 2025, a ransomware leak page surfaced identifying the victim as www.heitech.com.my, a technology company based in Malaysia. The post states that attackers claim to have exfiltrated about 60 GB of data and are demanding a ransom of 500k. A claim URL is indicated on the page, suggesting a channel for negotiation or data release, though the page itself does not display specific data samples or documents. The metadata provides a post date of 2025-11-04 00:14:43.926266, and no separate compromise date is listed; thus, this timestamp should be treated as the post date.

The leak page contains no visuals or screenshots to corroborate the claims, and there are no downloadable attachments or images shown. The content centers on the stated ransom amount and the claimed data exfiltration of 60 GB, with no explicit details about the data types or files involved. The focus remains on the victim’s domain, www.heitech.com.my, situated within the technology sector in Malaysia, rather than on any visible artifacts or internal documents on the page.

Overall, the entry reflects a data-leak-style claim associated with a ransomware operation, featuring a 60 GB data exfiltration claim and a ransom demand of 500k, plus a claim URL for engagement. In the absence of a defined compromise date in the record, the provided post date is treated as the publication date for this entry. The victim identified is www.heitech.com.my, a technology company based in Malaysia.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features