24 January 2020
Do you still remember the article that discussed the level of cyber security in Indonesia? Recently, Dittipidsiber Bareskrim Polri succeeded in uncovering the perpetrators who spread malware which is a threat to users of e-Commerce sites in Indonesia, and even the world. The disclosure was made under the banner of Night Fury Operation which consists of law enforcement and private sector agencies. Night Fury Operation is one of the programs of the ASEAN Cyber Capability Desk designed by Interpol and in collaboration with one of the companies engaged in preventing cyber attacks, namely Group-IB. One of the targets the operation focused on was the spread of malware called JS Sniffer.
JS Sniffer is an ‘intruder’ malware created to monitor all the information contained on the target site. The command found in this malware is 'get billing', which allows perpetrators to obtain banking information belonging to site visitors, such as
Based on Group-IB search results, JF Sniffer has succeeded in infecting more than 200 e-Commerce sites in various countries, including Indonesia.
After going through the investigation process, Dittipidsiber Bareskrim Polri succeeded in arresting several suspects who were suspected of being the perpetrators of the spread of JS Sniffer in Indonesia, namely K (35 years) and NA (25 years). The method is, they look for e-Commerce site vulnerabilities, then create a "door" that is inserted into the site so that every visitor who accesses the e-Commerce site will pass through the door they have prepared. Not only e-Commerce sites in Indonesia, the perpetrators also succeeded in infiltrating many e-Commerce sites from the UK, South Africa, Australia, the Netherlands and Germany. Within a period of 1 year, the perpetrator managed to collect a number of electronic items which, if collected, could reach IDR 150 million. Some of the evidence that was successfully secured included 1 (one) laptop, 5 (five) cellphones of various brands, 1 (one) CPU unit, 3 (three) ID cards. Suspect, 1 (one) BCA Token, 2 (two) ATM cards.
As a result of his actions, the suspect was subject to Article 30 Paragraph (1), Paragraph (2), Paragraph (3) Jo. 46 Paragraph (1) , Paragraph (2) , Paragraph (3) and/or Article 31 Paragraph (2) Jo. Article 47 and/or Article 32 Paragraph (1) and Paragraph (2) Jo. Article 48 Paragraph (1) and Paragraph (2) and/or Article 36 Jo. Article 51 Paragraph (2) Law Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Electronic Information and Transactions and/or 363 of the Criminal Code with the threat of a criminal penalty of 10 years in prison.
Dittipidsiber Bareskrim Polri realizes that law enforcement efforts are not enough to prevent casualties due to the spread of this malware. Therefore, Dittipidsiber Bareskrim Polri will increase cooperation with parties related to e-Commerce and cyber security so that not many people become victims. However, the public also needs to increase vigilance to avoid the threat of spreading malware, especially JF Sniffer. There are several things that can be done so that people can avoid this threat, namely:
01 Sep 2020
Annoyed with DS, Outsourcing Employee Umbar DS Info on Twitter
FPH is suspected of having illegally accessed the PT Telkomsel database, by abusing its authority to obtain someone's personal data. FPH then sent a photo of the display. . .
Link
26 Aug 2020
Hackers of 1309 sites belonging to State Institutions, Have Been Arrested by Cyber Police
ADC carries out illegal access to the targeted sites, then sends ransomeware with the intention of getting the victim to send a certain amount of money (Rp. 2 – 5 million) by promising to send a Decrypt Key to open the site. . .
Link
23 Jan 2020
Beware of WhatsApp Hijackers! Do this to be safe
Fraud via WhatsApp is one of the many methods reported by the public. The most frequently used mode is scanning the QR Code available on the Whatsapp Web feature on your cellphone. The Whatsapp hijacker will use your account to do various things
Link