{
	"id": "9aae928f-9983-488a-9b22-f072f46f356d",
	"created_at": "2026-04-09T02:23:44.17455Z",
	"updated_at": "2026-04-10T03:36:01.44935Z",
	"deleted_at": null,
	"sha1_hash": "030a5e90ecc95bb32fc93433af213501d13c32e6",
	"title": "DESORDEN leaks more data from Indonesia; \"Indo data is officially worthless\" - DataBreaches.Net",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 35102,
	"plain_text": "DESORDEN leaks more data from Indonesia; \"Indo data is\r\nofficially worthless\" - DataBreaches.Net\r\nPublished: 2022-09-22 · Archived: 2026-04-09 02:17:02 UTC\r\nThe DESORDEN group recently announced that due to the flood of personal information on Indonesians, they\r\nwere giving up on attacking Indonesian entities. But they also noted that they already had some attacks in progress\r\nthat they would still be leaking.\r\nToday, they announced one of those attacks on a popular hacking-related forum where data are shared, traded, or\r\nsold:\r\nWe take responsibilities for the hack and data breach of PT CARE TECHNOLOGIES\r\n(https://www.care.co.id), an insurance software and IT vendor for all 60+ major insurance and\r\nhealthcare companies in Indonesia, including clients such as AIG, Allianz, MNC, BRI Insurance, etc. In\r\ntotal, we have stolen 2.2 GB of databases from their network.\r\nDESORDEN then provided links to the full data leak, including .csv files with client data and employee data.\r\nAccording to DESORDEN, they acquired the logins of the clients to PT Care Technologies. More significantly,\r\nperhaps, they claim that the clients use the same version of the software that they obtained from PT Care:\r\nTheir clients deploy the same software version developed by PT Care Technologies as the one we\r\nbreached, so for those who want to explore further, can try exploring the vulnerabilities of their clients.\r\nIf need more information, pm @post to ask for the vulnerabilities\r\nIn a subsequent chat with DataBreaches. DESORDEN indicated that they had not attempted to access any of the\r\nclients but did not need logins for the clients. “Just needed to use the same vulnerability to access the clients self\r\nhosted version,” they explained. But they also indicated that the vulnerability would likely be fixed within a few\r\ndays as they had already informed the company about it. The fact that the firm had taken its servers down suggests\r\nthat they working on addressing the vulnerability and informing clients, they said.\r\nWhile the leaked data will be of some concern to PT Care Technologies and its clients, it was pretty much just a\r\nwasted effort for DESORDEN.\r\n“No one wants to buy Indonesia data,” they tell DataBreaches.\r\n“People are selling hundreds of millions for few hundred bucks — the supply of Indonesia data has already\r\ndumped the value of its data.”\r\n“Indo data is officially worthless. In the past, we could still sell 0.005 USD per record. Nowadays, 0.0002 USD\r\nper record and no one wants to buy.”\r\nhttps://www.databreaches.net/desorden-leaks-more-data-from-indonesia-indo-data-is-officially-worthless/\r\nPage 1 of 2\n\nWill the market flood make other Indonesian firms less attractive as targets for other adversaries? Time will tell,\r\nbut in light of all the leaks and data dumps we have already seen, Indonesian entities might take advantage of any\r\nlull and seriously address data protection, and now, not in two years.\r\nSource: https://www.databreaches.net/desorden-leaks-more-data-from-indonesia-indo-data-is-officially-worthless/\r\nhttps://www.databreaches.net/desorden-leaks-more-data-from-indonesia-indo-data-is-officially-worthless/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.databreaches.net/desorden-leaks-more-data-from-indonesia-indo-data-is-officially-worthless/"
	],
	"report_names": [
		"desorden-leaks-more-data-from-indonesia-indo-data-is-officially-worthless"
	],
	"threat_actors": [
		{
			"id": "e5ccc758-f2a5-417b-ba5c-70edf39bc048",
			"created_at": "2022-10-25T16:07:24.481513Z",
			"updated_at": "2026-04-10T02:00:05.005021Z",
			"deleted_at": null,
			"main_name": "Desorden",
			"aliases": [],
			"source_name": "ETDA:Desorden",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "3a69a32c-82d0-431b-b5ab-34a070bf8d94",
			"created_at": "2023-11-08T02:00:07.154393Z",
			"updated_at": "2026-04-10T02:00:03.428568Z",
			"deleted_at": null,
			"main_name": "Desorden Group",
			"aliases": [],
			"source_name": "MISPGALAXY:Desorden Group",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775701424,
	"ts_updated_at": 1775792161,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/030a5e90ecc95bb32fc93433af213501d13c32e6.pdf",
		"text": "https://archive.orkl.eu/030a5e90ecc95bb32fc93433af213501d13c32e6.txt",
		"img": "https://archive.orkl.eu/030a5e90ecc95bb32fc93433af213501d13c32e6.jpg"
	}
}