Thursday , March 27 2025

Authority Denies
Hacker claim ransomware attack on Indonesia’s state bank BRI

Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure and that normal transactions continue uninterrupted, despite rumors of a ransomware attack on social media.

On Wednesday evening, BRI’s Director of Digital and IT, Arga M. Nugraha, confirmed via Instagram that the bank’s systems are fully operational.

Source: darkwebinformer

“We confirm that both customer data and funds are secure. All BRI banking systems are functioning normally, and our transaction services are operating smoothly,” Arga said in the statement.

He assured customers that they can continue using BRI’s banking services, including digital platforms like BRImo, QLola, ATMs, CRMs, and more, with full data security.

The bank stated that its information security systems meet international standards and are regularly updated to tackle new threats.

“Proactive measures are in place to ensure that customer information remains protected,” Arga added.

The statement follows social media rumors on Wednesday evening about a possible data breach at BRI.

Source: darkwebinformer

The attack is thought to be connected to Bashe Ransomware, which has ties to the infamous LockBit group responsible for breaching Indonesia’s National Data Center in June.

Bashe Ransomware mainly targets high-value sectors such as technology, business services, manufacturing, finance, transportation, and healthcare. Its attacks occur in North America and Europe.

Bashe Ransomware usually spreads via phishing emails with malware. When a victim opens the email, the malware quickly encrypts their data across the network. Victims must pay a ransom to access their files again.

Source: darkwebinformer, jakartaglobe, indonesiabusinesspost

((Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means))

Check Also

ChatGPT

Hackers Exploit ChatGPT with CVE-2024-27564

Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s …

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending Threat Actor: Lockbit, Lazarus, Blackcat, Cybercriminals, SaltTyphoon, Scttered Spider, RedGolf, BlueBravo, North Korean Hackers, ...
Trending Malware: SocGholish, Colabtstrike, Linuxkernel, Plugx, Lockbit, Xmrig, REMCOM RAT, Play Ransomware, LummaC2, HijackLoader, BugSleep
Trending vulnerability:CVE: 2024-21887, CVE: 2024-6387, CVE: 2024-46805, CVE: 2017-11882, CVE: 2021-44228, CVE:2024-40348, CVE: 2024-38112
Techniques: T1059.001, T1082, T1486, T1190, T1083
Tactics: TA0007, TA0001, TA0005, TA0011
16:56