Friday , May 9 2025
titas gas

Hacker offer Titas gas root access to sale

“A threat actor has reportedly claimed to gain root-level access to Titas Gas’s firewall server and is actively offering this access for sale on the dark web, posing a serious risk to Bangladesh’s energy infrastructure”.

Bangladesh Cyber Security Intelligence (BCSI) reported that someone has reportedly gained unrestricted access to Titas Gas’s firewall server, allowing them potential entry into the company’s broader network. The threat actor is offering this access for $1,000, with the price expected to rise as they reach more critical servers and infrastructure.

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The hacker’s access presents serious data security risks for Titas Gas, which holds sensitive information such as names, mobile numbers, addresses, gas usage data, and classified documents about national minerals. This could potentially expose private customer data and crucial national resource information to malicious entities.

If the hacker’s claim about controlling the firewall server is true, they could intercept or alter communications within Titas Gas, possibly introducing malware or ransomware. This could disrupt operations, cause gas shortages, and undermine Bangladesh’s energy distribution, endangering both economic stability and national security.

If the hacker’s claimed reportedly to be valid to gain access to other systems, It could disrupt vital infrastructure, affect gas delivery, or hold critical systems for ransom. This threat impacts not only financial and data security but also Bangladesh’s national energy security.

Gas distribution interruptions, especially on a large scale, could lead to substantial losses in revenue for Titas and create energy supply issues for millions of Bangladeshi citizens and businesses. Industries reliant on natural gas, including manufacturing and transportation, could suffer disruptions, with broader impacts on the economy.

BCSI urges Titas Gas and the Bangladeshi government to act urgently to protect critical assets. Immediate actions like firewall audits, improved monitoring, and threat detection are necessary to identify unauthorized access. Incident response teams must collaborate with cybersecurity experts to manage the threat, strengthen defenses, and review security protocols to prevent future breaches.

Titas Gas, one of the primary natural gas suppliers in Bangladesh, is responsible for distributing gas to millions of residential and commercial customers. The company’s role is pivotal in Bangladesh’s energy sector, and any disruption could have widespread repercussions for both its customers and the nation’s economic stability.

Titas Gas provides services to around 2.88 million users in Bangladesh as of June 30, 2023. In the fiscal year 2022-23, it earned ৳26,387.12 crore (approximately $2.5 billion) and contributed ৳706.92 crore (about $68 million) to the national treasury. Titas plays a crucial role in the country’s energy sector and economic growth.

Infosecbulletin will continue to monitor the situation closely and provide updates while more info becomes available.

Thursday (31 October) Bangladesh Bank issues alert on cyber threat for the financial sector as some banks customers are victim to unauthorized transaction through Facebook ad manager. In this situation, Bangladesh Bank notifies the banks to take precautionary action to secure the account as well as advise to take stern action to protect users digital asset.

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

Passwordless

Microsoft New Accounts Go Passwordless By Default

Microsoft is focusing on eliminating password-based authentication, promoting passwordless sign-in and sign-up methods instead. For …

Leave a Reply

Your email address will not be published. Required fields are marked *