Date: July 3rd, 2019 | 14:27:10 WIB
Publication: Cybersecurity Daily
The Zapotlán Potable Water System Mexico website was compromised, with the URL http://www.sapaza.gob.mx/ being specifically targeted. The attack was carried out by the hacker known as ./BotKiller, affiliated with JavaGhost.
Hacker Details:
- Hacker Name: ./BotKiller
- Hacker Group: JavaGhost
Website Details:
- URL: http://www.sapaza.gob.mx/
- System: Linux
- Web Server: Nginx
- IP: 159.203.21.48
- Location: Canada
Incident Details:
- Proof of Concept: Brute force attack
- Reason: Not available
- Archive Page: https://defacer.id/mirror/id/77432
- Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/77432
The attack involved a brute force attack, where repeated attempts were made to gain unauthorized access to the system by guessing passwords or encryption keys.
Details on the motive behind the attack were not provided, and further information on the incident can be accessed via the archive page and the cyber attack report’s page.