Hacking Incident #265: Peru Provincial Municipality of Ayabaca (www.muniayabaca.gob.pe) Hacked by K4TSUY4-GH05T

Publication Date: September 15, 2020

On September 15th, 2020, the website of the Peru Provincial Municipality of Ayabaca (www.muniayabaca.gob.pe) was compromised by the hacker known as K4TSUY4-GH05T, who is affiliated with the hacker group 7Ghost-Team. The attack specifically targeted the URL http://www.muniayabaca.gob.pe/, indicating a breach involving the main page of the municipality’s official website.

The attacker utilized SQL Injection as the proof of concept for this incident. SQL Injection involves inserting malicious SQL statements into input fields to manipulate or access the underlying database of a web application. This exploitation method allowed the attacker to compromise the website by exploiting vulnerabilities in the system.

The reason provided by the hacker for this attack was a desire to be recognized as the best defacer. This suggests that the primary motivation behind the breach was to gain recognition and prestige within the hacking community by showcasing their defacing skills.

Hacker Details:

  • Hacker Name: K4TSUY4-GH05T
  • Hacker Group: 7Ghost-Team

Website Details:

Incident Details:

  • Date: September 15th, 2020 20:36:14 (WIB)
  • Proof of Concept: SQL Injection
  • Reason: I just want to be the best defacer

Archive Page: https://defacer.id/mirror/id/107916
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/107916