Hacking Incident #375: 3 Domains of Yogyakarta Administrative Court (PTUN Yogyakarta) Taken Over by SynZx25

Date: September 18, 2024
Location: Indonesia

On September 18, 2024, three websites associated with the Yogyakarta Administrative Court (PTUN Yogyakarta) were compromised by the hacker known as SynZx25, affiliated with the group LDC Exploit. The attack exploited a known vulnerability in the web server’s system, which had not been patched, leading to unauthorized access and defacement of the affected pages.

Hacker Details:

  • Hacker Name: SynZx25
  • Hacker Group: LDC Exploit

Website Details:

  • System: Linux
  • Web Server: Nginx
  • IP Address: 103.217.210.76

Incident Details:

  • Date of Incident: September 18th, 2024 (WIB)
  • Method of Attack: Exploitation of a known vulnerability (unpatched system)
  • Motivation: “Heh… just for fun!”

Hacked Pages:

  1. https://ptun-yogyakarta.go.id/LDC.html
  2. https://jdih.ptun-yogyakarta.go.id/images/
  3. https://sipp.ptun-yogyakarta.go.id/resources/img/

Archive Pages:

Cyber Attack Report Pages:

The compromised pages included https://ptun-yogyakarta.go.id/LDC.html, https://jdih.ptun-yogyakarta.go.id/images/, and https://sipp.ptun-yogyakarta.go.id/resources/img/. On these pages, SynZx25 left a provocative message:

“Ah, a true ‘professional’—highly skilled in corruption

leadership without responsibility, and collecting a paycheck for doing nothing.”

This statement underscores a criticism of perceived inefficiencies and corruption within the governmental system.

The incident raises significant concerns regarding the cybersecurity measures in place for government websites, particularly in terms of keeping systems updated and secure against known vulnerabilities.