Date: June 14th, 2019 | 00:06:08 WIB
Publication: Cybersecurity Daily
The SIMENTOR Kementerian Pekerjaan Umum dan Perumahan Rakyat website was compromised, with the URL http://simentor.pu.go.id/-.txt being specifically targeted. The attack was executed by the hacker known as Mr.Yagami, affiliated with the hacker group Ghost Riddiculous Team.
Hacker Details:
- Hacker Name: Mr.Yagami
- Hacker Group: Ghost Riddiculous Team
Website Details:
- URL: http://simentor.pu.go.id/-.txt
- System: Windows 2008
- Web Server: Apache
- IP: 103.211.51.221
- Location: Indonesia
Incident Details:
- Proof of Concept: SQL Injection
- Reason: Heh…just for fun!
- Archive Page: https://defacer.id/mirror/id/68666
- Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/68666
The attack utilized SQL Injection, a technique where malicious SQL queries are inserted into input fields to manipulate or access the website’s database. This method indicates the presence of unaddressed security flaws in the system.
The motivation behind the attack was described as “just for fun,” indicating that the breach was driven by personal amusement rather than any malicious intent or specific agenda.