Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

PT Bank Pembangunan Daerah Banten Tbk

bankbanten.co.id

Group Medusa
Discovered 2024-03-27 21:36 UTC
Est. attack date 2024-03-27
Country ID
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

PT Bank Pembangunan Daerah Banten Tbk - founded in 1992, it is currently owned by the Banten Provincial government and has the status of a regional development bank. Currently, the Company serves customers of deposits, credit distribution (MSME, Consumer Credit and Commercial Credit), and other services and has been appointed as a partner of the Provincial Government of Banten in local cash management. Bank Pembangunan Daerah Banten Tbk PT corporate office is located in Environment Ruko Nine No. 8b-9a Sumur Pecung Village Jl. Sudirman Kemang, Serang, Banten, Indonesia and has 435 employees. The total amount of data leakage is 108.47 GB and includes all customer financial information SQL Database.

Infostealer activity detected by HudsonRock

Compromised Employees: 14

Compromised Users: 25

Third Party Employee Credentials: 8


External Attack Surface: 6


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • mx2.bankbanten.co.id.
  • mail.bankbanten.co.id.
TXT Records
  • 0nd9csnp2j97y5w41qfp4ylv8fjchztp
  • MS=D52AE8439E85DE18D02F8A2F3E01F869EEF95BCC
  • PT. Bank Pembangunan Daerah Banten, Tbk.
  • google-site-verification=8xQi5yPo8-svzMJxst3ELl2MWAqF8fhPmhWW_QB1xAM
  • google-site-verification=CxgfEmdGrs-TMAofOH9Mh2A9ayVbbUihFOy4sUJ_hYk
  • spf2.0/mfrom mx -all
  • v=spf1 ip4:139.0.15.51 ip4:202.152.13.181 ip4:202.137.3.89 -all
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.

Leak Screenshot:

Leak Screenshot