Breaking

Bank Indonesia ransomware attack by Conti hackers leave 13.88 data at stake

The Conti ransomware group orchestrated an attack on Bank Indonesia last month and the same has been confirmed yesterday by the organization. The ransomware operator stolen some non-sensitive data from BI database, which includes employees data as well.

Pratama Persadha, a cybersecurity expert from CISSReC mentioned that the Conti ransomware operators are the most dangerous hacker group in the world, as they have 100 percent success rate when they target a entity.

Bank Indonesia ransomware attack and its say on the incident

Bank Indonesia’s spokesperson Erwin Haryono mentioned that they were aware of the attack, but appropriate security measures were taken and the public services were working fine. The team is also handling the recover operations regarding the same.

Source: Security Affairs

Haryono also added that the attack was executed last month, however, we were able to confirm the same only by yesterday. Though the company didn’t reveal the hackers behind the Bank Indonesia ransomware attack, it was later claimed by Conti ransomware group.

Conti’s role on Bank Indonesia ransomware attack

Conti leaked some files stolen from Bank Indonesia from the database of 13.88 GB proving their claim behind the bank’s ransomware attack. Conti is a ransomware gang which is heavily linked to Moscow through the Wizard Spider entity. The former is the one behind TrickBot, Bazarloader, and Ryuk ransomware attacks.

Conti is known for breaching networks and infecting the devices with malware, and then via those malware the operators will gain remote access to the infected devices. Once inside the network, the hackers ex-filtrate the data and then finally deploy the ransomware payload.

Conti ransomware group is the one behind the Ireland Department of Health ransomware attack, and also had launched around 400 attacks on US and other international organizations.


Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

3 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago