Hackers encrypted all data, the Indonesian Government discovered there was no back-up
A cyber attack considered the worst in many years in Indonesia occurred on June 20. Hackers used a variant of LockBit 3.0 malware called Brain Cipher to compromise Indonesia's Provisional National Data Center (PDNS).
This software not only extracts sensitive data but also encrypts them on servers.
This attack caused heavy damage to Indonesia, affected more than 230 public agencies in Indonesia, including ministries, and caused serious disruption to a number of important national services such as immigration and immigration. operates at major airports.
The attacker demanded a ransom of $8 million. But the Indonesian government said it would not pay hackers the money to ransom the data.
After the attack, Indonesian President Joko Widodo ordered an audit of the country's data centers. As a result, 98% of government data stored in one of the two attacked data centers was not backed up even though the data center had backup capacity to store the data. Due to budget constraints, many government agencies do not use backup services. This means they cannot be recovered beyond decrypting the storage systems of the affected servers.
This cyber attack on Indonesia exposed a serious mistake in the country's information technology (IT) policy.
You should read it
- Facebook is a new trend in cyber attacks
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
- CMC InfoSec provides malware removal tool for online DDoS attack
- Keysight's security expert warns against the new cyber attack process
- Detects new Xcode malware targeting iOS developers
- Modular Malware - New stealth attack method to steal data
- Detecting a Google Drive vulnerability could allow hackers to trick users into installing malware
- Cyber-Attack attacked the US military network
May be interested
- How to Back Up Datathis article shows you how to back up data on your computer or smartphone. backing up your computer or phone data creates a copy of the data so you can restore it if your computer, phone, or tablet crashes or loses data.
- How to check if your VPN connection is actually encryptedtry testing by transferring some packets when not connected to the vpn and do the same when connecting, then compare. it is easy to realize that the data being transferred is actually encrypted when they are sent to the vpn
- Classify hackers and career opportunities for true hackersmust white hat hackers, black hat hackers, gray-hat hackers have to be all kinds of hackers in the world? let's find out the hacker classification in this article.
- Virus tracking software 'draw lines' for hackersprograms that monitor and record unusual phenomena on the internet because security companies set up secrets are being discovered by hackers and take advantage of their attacks.
- Discovered a group of hackers who use secret code to spy on 21 countriesa group of secret hackers specialized in using android malicious code and other sophisticated reconnaissance tools to steal messages, call history, documents of the press, military, corporation and many other targets at 21 newly discovered country in beirut.
- Do you know who white hat hackers are and how their lives are?what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?
- Customer data collected during Capital 14's 14 years was stolenthis may be considered the biggest data theft ever recorded in the us.
- Can your data be stolen when using public Wifi?in technology terms, man-in-the-middle (mitm) is an attack that is intercepted by a third party (hackers) during communication between the server and the user. instead of the data being shared directly between the server and the user, the links will be broken by another factor. then hackers will change the content or add some malware to send to you.
- [Infographic] Things to know about a hackerhave you ever considered a hacker to be a career? the infographic below will help you know if becoming a hacker is right for you.
- The US shares the top 20 vulnerabilities most exploited by Chinese hackers since 2020 until nownsa, cisa and fbi have just released a list of vulnerabilities most exploited by chinese hackers to target government and critical infrastructure networks.