Publication Date: September 28, 2020
On September 28th, 2020, the website of the Directorate of Processed Food Standardization (POM) (standarpangan.pom.go.id) was compromised by the hacker known as T1D4K D1K3N4L, affiliated with the PsychoXploit group. The attack targeted the main URL of the website, indicating a breach involving the primary domain.
The attacker used SQL Injection as the proof of concept for this incident. SQL Injection is a technique that exploits vulnerabilities in a website’s database layer by injecting malicious SQL queries. This allows the attacker to gain unauthorized access, manipulate, or extract sensitive information from the database.
The reason given for the attack was “As a challenge,” suggesting that the hacker was motivated by the technical challenge rather than financial gain or political motives.
Hacker Details:
- Hacker Name: T1D4K D1K3N4L
- Hacker Group: PsychoXploit
Website Details:
- URL: https://standarpangan.pom.go.id
- System: Windows 2008
- Web Server: Apache
- IP: 103.5.148.42
- Location: Indonesia
Incident Details:
- Date: September 28th, 2020 02:06:57 (WIB)
- Proof of Concept: SQL Injection
- Reason: As a challenge
Archive Page: https://defacer.id/mirror/id/110799
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/110799