TheGentlemen Strikes Astra Otoparts with Devastating Ransomware Attack

Ransomware

Summary

On October 3, 2025, the ransomware group TheGentlemen launched an attack on
Astra Otoparts / PT. Inti Ganda Perdana (astra-otoparts.com), a prominent player in Indonesia’s automotive sector. The threat actor has warned of releasing confidential data unless their demands are met.


Incident Report

FieldDetails
TargetAstra Otoparts / PT. Inti Ganda Perdana
Domainastra-otoparts.com
CountryIndonesia
Attacking GroupTheGentlemen
Date ReportedOctober 3, 2025
Threat Actor Statement“The full leak will be published soon, unless a company representative contacts us via the channels provided.”

Astra Otoparts, listed under the stock symbol AUTO.JK, is a key player in the manufacturing and trading of automotive components across various markets, including Asia, the Middle East, and Africa. The company’s subsidiary, PT. Inti Ganda Perdana, is renowned for its production of drive shafts and axles, emphasizing a competitive advantage in the global market.

TheGentlemen group is known for orchestrating sophisticated ransomware attacks, targeting companies with significant market influence. Their modus operandi often includes data encryption and threats of sensitive data leaks to pressure victims into compliance.

In response to such threats, it is crucial for organizations to adopt proactive measures, including dark web monitoring, to safeguard against potential breaches. Regularly scanning for compromised credentials and sensitive data on platforms like MSP DarkIntel’s domain breach scan can help companies maintain vigilance and respond swiftly to potential threats.

Recommendations

  • Monitor your domains and email addresses for exposure using reputable threat intelligence tools.
  • Conduct a full compromise assessment and incident response drill internally.
  • Verify backups and ensure they are offline and ransomware-resistant.
  • Educate staff on phishing, social engineering, and lateral movement techniques used by groups like Qilin.
  • Engage with cyber forensics and legal counsel before initiating contact with threat actors.

Check Your Exposure

Wondering if your organization or employees are impacted by recent breach activity?


Disclaimer

The MSPDarkIntel team does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information.
All breach data reported here is sourced from publicly available threat intelligence feeds for awareness and early-warning purposes only.
Our goal is to inform organizations of emerging threats so they can take timely defensive action.

Keep reading