• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 

Google fixed two Qualcomm bugs that were actively exploited in the wild

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Data Breach
  • Deep Web
  • Hacking
  • Vast Voter Data Leaks Cast Shadow Over Indonesia ’s 2024 Presidential Election

Vast Voter Data Leaks Cast Shadow Over Indonesia ’s 2024 Presidential Election

Pierluigi Paganini January 12, 2024

Investigators from Resecurity’s HUNTER (HUMINT) warn that Indonesia is increasingly being targeted by cyber-threat actors.

Investigators from Resecurity’s HUNTER (HUMINT) have found that Indonesia is increasingly being targeted by cyber-threat actors who have staged attacks that pose significant long-term risks to the integrity of the country’s elections. These findings coincide with the critical and fast-approaching Indonesian presidential election set to take place in February this year (2024). This contest may have significant implications for the political destiny of the majority Muslim, Southeast Asian (SEA) nation, which is also the third-largest democracy in the world.

The SEA nation is thus caught in a familiar tug of war between Eastern and Western superpowers that shaped its controversial political trajectory during the Cold War. Today, Indonesia is at a “critical crossroads for trade and a potential flashpoint for global conflict,” noted the South China Morning Post. Thus, Resecurity is specifically concerned that both foreign and domestic threat actors may exploit the sensitive personally identifying information (PII) of Indonesian voters obtained from various network intrusions to stage targeted information-warfare campaigns during the 2024 Indonesian election and beyond.

One particularly alarming breach tracked by HUNTER analysts led to the leak of 6.8 million voter records related to the 2017 Jakarta gubernatorial election on the ‘eleakstore,’ and on the Hydra Market cybercriminal forums in TOR network.


Indonesia

The Jakarta gubernatorial election is particularly significant to Indonesia because the city is both the capital of the country and its largest metropolis. Threat actors obtained Jakarta voters’ records after breaching and exfiltrating data from web resources presumably related to the DKI Jakarta Provincial government. The structure of the data leaked is arranged by family card number (no_kk), single identity number (NIK), name (nama), place of birth (tmpt_lahir), birth date (tgl_lahir), gender, address (alamat), city (kota), and district (kecamatan).

Just before the onset of 2024, an individual known as Kimbo disclosed details regarding a suspected breach of the General Elections Commission of Indonesia’s (KPU) information system. This breach reportedly involves a substantial database containing records of numerous citizens, totaling 252,327,304 entries. Kimbo has put this database up for sale at a price of $74,000, equivalent to 2 Bitcoins. The data set in question is said to include personally identifiable information (PII), encompassing passport details.

Indonesia

To provide further evidence, the actor shared multiple sample records and also offered 500,000 records for free. Another data set released by the actor included information about Indonesian voters who live abroad but are still eligible to vote in elections. Importantly, Indonesian voters residing overseas can take part in elections through their local embassy in the country where they live. The actor disclosed various confirmation records associated with the Indonesian Embassy in Abu Dhabi (KBRI Abu Dhabi) and in Singapore (KBRI Singapura). Resecurity contacted a number of people who were unknowingly affected by a data leak. The feedback suggests they had no clue their personal information (like names, addresses, and more) had been compromised and was circulating in the shady parts of the internet.

Given the very close proximity to the upcoming elections in Indonesia, this activity appears to be methodically planned and not a random occurrence.

Indonesia

Resecurity has also identified that several endpoints associated with the General Elections Commission of Indonesia (KPU) were compromised with malicious software. Evidence supporting this was gathered around December 2023, when it was discovered that at least two employees had fallen victim to common password-stealing programs – Nexus Stealer and Lumma, which are readily available on the Dark Web. Focusing attacks on staff members who have access to election IT systems remains a primary method that malicious actors might use to infiltrate these environments. By targeting these individuals, attackers have the potential to breach the system and extract sensitive data, posing a significant risk to the integrity of the election process.

Indonesia

Cybersecurity experts highlighted the growing risks for citizen’s digital identity – in addition to directly targeting elections, cybercriminals are also selling the personal identifiable information (PII) of Indonesian citizens. A database containing over 2.3 million records has been advertised for sale on the UFO Leak Market within Telegram. The exposed data includes sensitive personal details that could potentially be exploited by cybercriminals for identity theft and fraudulent activities.

Take a look at the Resecurity’s analysis for further information:

https://www.resecurity.com/blog/article/vast-voter-data-leaks-cast-shadow-over-indonesias-2024-presidential-election

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Indonesia)


facebook linkedin twitter

Cybercrime dark we Dark Web data breach Hacking hacking news information security news IT Information Security Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini August 11, 2025
MedusaLocker ransomware group is looking for pentesters
Read more
Pierluigi Paganini August 10, 2025
Google confirms Salesforce CRM breach, faces extortion threat
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    MedusaLocker ransomware group is looking for pentesters

    Hacking / August 11, 2025

    Google confirms Salesforce CRM breach, faces extortion threat

    Data Breach / August 10, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

    Breaking News / August 10, 2025

    Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / August 10, 2025

    Embargo Ransomware nets $34.2M in crypto since April 2024

    Cyber Crime / August 09, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT