In a recent post on a dark web forum, a notorious threat actor claimed responsibility for breaching a significant Indonesian government database. The individual, operating under the alias “@303,” announced that they had successfully obtained the database and provided a sample of the compromised data.
A sample of the exposed data was also included in the post, featuring various sensitive fields such as user login information, passwords, email addresses, and account statuses. Specifically, the leaked data contained details like:
- User login credentials
- Passwords (likely hashed)
- User email addresses
- Account registration dates
- Activation keys and status