Threat Actor: @303 | @303
Victim: Indonesian Government | Indonesian Government
Price: Not disclosed
Exfiltrated Data Type: Sensitive user information
Key Points :
- The threat actor claimed to have breached a significant Indonesian government database.
- A sample of the compromised data was shared on a dark web forum.
- The leaked data includes user login credentials, passwords, email addresses, and account statuses.
- Specific details in the leaked data include activation keys and registration dates.
- The breach highlights vulnerabilities in government database security.
In a recent post on a dark web forum, a notorious threat actor claimed responsibility for breaching a significant Indonesian government database. The individual, operating under the alias “@303,” announced that they had successfully obtained the database and provided a sample of the compromised data.
A sample of the exposed data was also included in the post, featuring various sensitive fields such as user login information, passwords, email addresses, and account statuses. Specifically, the leaked data contained details like:
- User login credentials
- Passwords (likely hashed)
- User email addresses
- Account registration dates
- Activation keys and status
The post Threat Actor Claims Breach of Indonesian Government Database appeared first on Daily Dark Web.