August 17th, 2019 | Cybersecurity Daily
On August 17th, 2019, the Blitar City Government website, located at http://blitar.go.id, was compromised. The attacker, identified as Xenon1205 from the Rabbit Cyber Team group, used a remote service password bruteforce attack to breach the site, leading to unauthorized access and defacement.
Hacker Details:
- Hacker Name: Xenon1205
- Hacker Group: Rabbit Cyber Team
Website Details:
- URL: http://blitar.go.id
- System: Linux
- Web Server: Apache
- IP: 103.247.13.209
- Location: Indonesia
Incident Details:
- Date: August 17th, 2019 09:45:14 (WIB)
- Proof of Concept: Remote Service Password Bruteforce
- Reason: Heh…just for fun!
Archive Page: https://defacer.id/mirror/id/89724
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/89724
The attacker employed a remote service password bruteforce attack, where various password combinations were systematically tried to gain access to the site. This method targets weak or poorly secured passwords, allowing unauthorized users to breach systems.
The reason for the attack was noted as “Heh…just for fun!” indicating that the motivation behind the breach was likely to challenge skills or create disruption for personal amusement rather than for any specific objective.