Hacking Incident #217: Blitar City Government (blitar.go.id) Hacked by Xenon1205

August 17th, 2019 | Cybersecurity Daily

On August 17th, 2019, the Blitar City Government website, located at http://blitar.go.id, was compromised. The attacker, identified as Xenon1205 from the Rabbit Cyber Team group, used a remote service password bruteforce attack to breach the site, leading to unauthorized access and defacement.

Hacker Details:

  • Hacker Name: Xenon1205
  • Hacker Group: Rabbit Cyber Team

Website Details:

  • URL: http://blitar.go.id
  • System: Linux
  • Web Server: Apache
  • IP: 103.247.13.209
  • Location: Indonesia

Incident Details:

  • Date: August 17th, 2019 09:45:14 (WIB)
  • Proof of Concept: Remote Service Password Bruteforce
  • Reason: Heh…just for fun!

Archive Page: https://defacer.id/mirror/id/89724
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/89724

The attacker employed a remote service password bruteforce attack, where various password combinations were systematically tried to gain access to the site. This method targets weak or poorly secured passwords, allowing unauthorized users to breach systems.

The reason for the attack was noted as “Heh…just for fun!” indicating that the motivation behind the breach was likely to challenge skills or create disruption for personal amusement rather than for any specific objective.