Breaking

Bank Indonesia ransomware attack by Conti hackers leave 13.88 data at stake

The Conti ransomware group orchestrated an attack on Bank Indonesia last month and the same has been confirmed yesterday by the organization. The ransomware operator stolen some non-sensitive data from BI database, which includes employees data as well.

Pratama Persadha, a cybersecurity expert from CISSReC mentioned that the Conti ransomware operators are the most dangerous hacker group in the world, as they have 100 percent success rate when they target a entity.

Bank Indonesia ransomware attack and its say on the incident

Bank Indonesia’s spokesperson Erwin Haryono mentioned that they were aware of the attack, but appropriate security measures were taken and the public services were working fine. The team is also handling the recover operations regarding the same.

Source: Security Affairs

Haryono also added that the attack was executed last month, however, we were able to confirm the same only by yesterday. Though the company didn’t reveal the hackers behind the Bank Indonesia ransomware attack, it was later claimed by Conti ransomware group.

Conti’s role on Bank Indonesia ransomware attack

Conti leaked some files stolen from Bank Indonesia from the database of 13.88 GB proving their claim behind the bank’s ransomware attack. Conti is a ransomware gang which is heavily linked to Moscow through the Wizard Spider entity. The former is the one behind TrickBot, Bazarloader, and Ryuk ransomware attacks.

Conti is known for breaching networks and infecting the devices with malware, and then via those malware the operators will gain remote access to the infected devices. Once inside the network, the hackers ex-filtrate the data and then finally deploy the ransomware payload.

Conti ransomware group is the one behind the Ireland Department of Health ransomware attack, and also had launched around 400 attacks on US and other international organizations.


Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

4 months ago

Patch My PC: Streamlined Software Management for ConfigMgr and Intune

Patch My PC is a widely-used solution that simplifies third-party application management by automating app…

4 months ago

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

4 months ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

5 months ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

6 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

6 months ago