August 6th, 2019 | Cybersecurity Daily
On August 6th, 2019, the website of KPU Pagar Alam City, found at http://kota-pagaralam.kpu.go.id/f.htm, was compromised. The attacker, identified as ./Fell Ganns from the Manusia Biasa Team, executed a successful SQL Injection attack on the site. The breach specifically targeted the main page, leading to unauthorized changes and defacement.
Hacker Details:
- Hacker Name: ./Fell Ganns
- Hacker Group: Manusia Biasa Team
Website Details:
- URL: http://kota-pagaralam.kpu.go.id/f.htm
- System: Linux
- Web Server: Apache
- IP: 182.23.163.2
- Location: Indonesia
Incident Details:
- Date: August 6th, 2019 14:45:59 (WIB)
- Proof of Concept: SQL Injection
- Reason: Heh…just for fun!
Archive Page: https://defacer.id/mirror/id/85906
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/85906
The attacker utilized an SQL Injection vulnerability to exploit the website. SQL Injection involves injecting malicious SQL queries into input fields or URLs to manipulate the database. In this case, the attacker likely used the vulnerability to execute unauthorized commands, gaining access to and altering the website’s data or functionality.
The reason given for the attack was simply “Heh…just for fun!” This suggests that the hacker’s motivation was not driven by a specific agenda or objective, but rather a desire to demonstrate their skills or create disruption without a clear purpose beyond amusement.