Publication Date: August 23rd, 2024
Incident Date: August 23rd, 2024
The Gisagara District Rwanda (gisagara.gov.rw) was targeted in this incident. The attack was executed by Ramil Feyziyev from the hacker group Az-Xploit.
Hacker Details:
- Hacker Name: Ramil Feyziyev
- Hacker Group: Az-Xploit
Website Details:
- System: Linux
- Web Server: Apache
- IP: 197.243.26.120
- Location: Rwanda
Incident Details:
- Date: August 23rd, 2024 04:15:27 (WIB)
- Proof of Concept: Remote administrative panel access through bruteforcing
- Reason: Revenge against that website
The hack involved gaining access to the remote administrative panel through bruteforcing, a method that attempts multiple passwords until successful. The motive behind the attack was stated as revenge against the website, indicating a personal or ideological grievance.
Compromised Subdomains:
This section lists the URLs of the 3 subdomains of the Toyota Israel website that were compromised during the hacking incident. Each link represents a specific page or resource that was taken over by the hacker.
- http://nyarutejacell.gisagara.gov.rw/salam.txt
- http://nyamugalicell.gisagara.gov.rw/salam.txt
- http://nyakibungocell.gisagara.gov.rw/salam.txt
Archive Page: https://defacer.id/mirror/id/124370
Cyber Attack Report’s Page: https://defacer.id/cyber-attack-report/124370