Tuesday, November 19, 2024

Hacker claims to have breached Indonesia’s Ministry of Defense website, secret documents might be at risk

Reading Time: 2 minutes
Julian Isaac

Journalist

Mahinda Arkyasa

Editor

Interview

An anonymous hacker, known as “Two2,” has claimed to have successfully breached the website of the Ministry of Defense in Indonesia, kemhan.go.id. The hacker asserted gaining access to the website’s dashboard panel.

In a post on BreachForums, Two2 shared several screenshots from the kemhan.go.id dashboard. One of the screenshots revealed that the website had utilized 1.64 terabytes of storage out of 2 terabytes available.

Pratama Persadha, Chairman of Communication and Information System Security Research Center (CISSReC), noted that hackers typically aim to sell the data they obtain during a breach. In this case, the hacker offered accounts with access to the kemhan.go.id dashboard for sale.

While the shared documents were not classified, Pratama emphasized that it is possible for website users or employees to inadvertently store sensitive documents on the site, potentially compromising national security.

He also mentioned that the obtained accounts could be used to access other systems within the Ministry of Defense that contain important data and classified documents.

CISSReC conducted an investigation and found that kemhan.go.id had various vulnerabilities related to credentials, with 667 users and 37 employees experiencing data leaks. These leaks could be exploited for unauthorized access to the website.

In their examination, CISSReC also identified subdomain URLs from kemhan.go.id that could potentially serve as attack points against the Ministry of Defense’s website.

Pratama suggested that the cyberattack on kemhan.go.id was likely a “Stealer” malware attack. He explained that this type of malware is typically used to collect information that can be monetized by attackers.

Stealer malware’s standard form is to gather login information such as usernames and passwords, which are then sent to other systems through email or networks.

After successfully extracting sensitive data from the target device, hackers send this information to threat actors who may use it for extortion, ransom demands, or sell it on the dark web or forums as stolen goods.

Pratama highlighted that malware-based cyberattacks are favored by hackers because direct attacks on targeted systems from the outside are challenging due to multiple security measures in place. Thus, hackers exploit human error, which often represents the weakest point in cybersecurity.

Furthermore, Pratama explained the existence of “Malware as a Service” (MaaS), where cybercriminals provide various types of malware to users or customers who pay for the service. Customers of MaaS typically lack technical knowledge and skills to create malware themselves, so they can rent or purchase pre-made malware for launching attacks or other malicious activities.

The exact attack vector used by the hacker to access kemhan.go.id’s dashboard panel has not been determined yet. Pratama suggested that users are required to change the passwords of their accounts, both on the kemhan.go.id website and their personal accounts (email, social media, etc.).

It’s important to note that the Ministry of Defense’s website is now inaccessible, likely for investigative and system maintenance purposes, in an effort to prevent the use of leaked passwords for unauthorized access.

Julian Isaac

Journalist

Mahinda Arkyasa

Editor

 

Interview

SUBSCRIBE NOW
We will provide you with an invoice for your reimbursable expenses.

Free

New to Indonesian market? Read our free articles before subscribing to the premium plan. If you already run your business in Indonesia, make sure to subscribe to the premium subscription so you won’t miss any intelligence & business opportunities.

Premium

$550 USD/Year

or

$45 USD/Month

Cancelation: you can cancel your subscription at any time, by sending us an email inquiry@ibp-media.com

Add keywords to your market watch and receive notification:
Schedule a free consultation with us:

We’ll contact you for confirmation.

FURTHER READING

PT PLN (Persero) has solidified five strategic partnerships to advance Indonesia’s energy transition during the 29th Conference of the Parties (COP29) held in Baku, Azerbaijan. These collaborations focus on funding, technology, and human resource development to accelerate the development of clean energy infrastructure in Indonesia, paving the way for sustainable energy self-sufficiency.
Business competition in the downstream oil and gas sector, particularly in the distribution of fuel oil, is increasingly difficult for foreign players, an industry player has said.
PT Pertamina Hulu Energi Offshore North West Java (PHE ONWJ), an upstream subholding of State energy company PT Pertamina, has begun the construction of the OOA Platform, part of the OO-OX Field development project off the Java Sea, marked by the cutting of the offshore platform plate in Bintan, Riau Islands, on Wednesday, November 6, 2024.
Commander of the Marine Corps Major General Endi Supardi reveals that President Prabowo Subianto has authorize the post of Marine Corps Commander to be held by a three-star general from the current two-star general.
The Attorney General’s Office is investigating palm oil producer PT Darmex Plantations over corruption and money laundering allegations inflicted on giant oil palm plantation and palm oil producer PT Duta Palma Group’s business activities in Indragiri Hulu regency, Riau.
Indonesia’s power utility PT PLN is seeking global support and funding to achieve the government’s additional target of renewable energy installed capacity of 75 Gigawatt (GW) in the next 15 years.