Hacking Incident #281: Blitar Regency Government (sidawai.blitarkab.go.id) Hacked by ./meicookies

Incident Date: October 7, 2020, 19:45:07 (WIB)

Hacker Details:
Hacker Name: ./meicookies

Website Details:
URL: www.sidawai.blitarkab.go.id/
System: Windows 2008
Web Server: Apache
IP: 103.139.188.133
Location: Indonesia

Incident Details:
Proof of Concept: SQL Injection
Reason: Heh…just for fun!

Archive Page:
https://defacer.id/mirror/id/113268

Cyber Attack Report’s Page:
https://defacer.id/cyber-attack-report/113268

The Blitar Regency Government website, under the domain www.sidawai.blitarkab.go.id, was targeted in this hacking incident. The breach affected the entire website. The attack was executed by the hacker known as ./meicookies.

SQL Injection was the Proof of Concept utilized in this incident. This method involves exploiting vulnerabilities in the site’s database by injecting malicious SQL commands, which can compromise the integrity and security of the data.

The motivation behind the attack was “just for fun,” indicating that ./meicookies engaged in the hack for personal amusement rather than for political, financial, or ideological reasons.