Threat Actor: MoonzHaxor | MoonzHaxor
Victim: Indonesian Fingerprint Identification System (INAFIS) | INAFIS
Price: Not specified
Exfiltrated Data Type: INAFIS face member data, fingerprint member data with email addresses, INAFIS Spring Boot application, and its database configuration properties
Key Points :
- A potential data breach has been detected involving the Indonesian Automatic Fingerprint Identification System (INAFIS).
- The threat actor, MoonzHaxor, claims to be selling sensitive data from INAFIS.
- The stolen data includes INAFIS face member data, fingerprint member data with email addresses, and the INAFIS Spring Boot application along with its database configuration properties.
Jakarta, Indonesia – A potential data breach has been detected involving the Indonesia Automatic Fingerprint Identification System (INAFIS), according to a post on a hacking forum. The threat actor, identified as “MoonzHaxor,” claims to be selling sensitive data from INAFIS. This incident follows a similar breach involving the Indonesian National Armed Forces Strategic Intelligence Agency.
MoonzHaxor’s post alleges that the stolen data includes INAFIS face member data, fingerprint member data with email addresses, and the INAFIS Spring Boot application along with its database configuration properties. The hacker has reportedly provided various samples to substantiate these claims.
Deep Web Konek has reached out to confirm the authenticity of the alleged data breach. However, as of now, the claims have not been officially verified by authorities. An investigation is currently underway.
This breach underscores the growing cybersecurity challenges faced by critical infrastructure in Indonesia. Further updates will be provided as the investigation continues.
Jakarta, Indonesia – A potential data breach has been detected involving the Indonesia Automatic Fingerprint Identification System (INAFIS), according to a post on a hacking forum. The threat actor, identified as “MoonzHaxor,” claims to be selling sensitive data from INAFIS. This incident follows a similar breach involving the Indonesian National Armed Forces Strategic Intelligence Agency.
MoonzHaxor’s post alleges that the stolen data includes INAFIS face member data, fingerprint member data with email addresses, and the INAFIS Spring Boot application along with its database configuration properties. The hacker has reportedly provided various samples to substantiate these claims.
Deep Web Konek has reached out to confirm the authenticity of the alleged data breach. However, as of now, the claims have not been officially verified by authorities. An investigation is currently underway.
This breach underscores the growing cybersecurity challenges faced by critical infrastructure in Indonesia. Further updates will be provided as the investigation continues.