loading…
Hacking government sites because the security is still weak and has not become a deep-rooted culture. PHOTOIST
JAKARTA – A number of government-owned site hacked and used as an online gambling site. Although some of the perpetrators have been arrested, cybersecurity expert Pratama Persadha said similar hacking practices are likely to become a trend, given the weakness of cybersecurity on websites owned by government and state institutions.
According to him, it is easy for perpetrators to hack government websites because the security is still weak and has not become a deep-rooted culture. He said that government sites were victims of web defacement, but now it is starting to become a hacked trend for online gambling sites. READ ALSO – Trump’s Website Hacked, Erdoan Videos and Letters From the Koran Appear
The hackers then create a url on the hacked domain which is difficult to track, and not easily known by the owner of the system.
“There are hundreds of government websites that have been infiltrated by online gambling due to weaknesses in the web system so that it is easy for perpetrators to enter and embed these advertisements,” said Pratama in a written statement.
Hackers take advantage of government websites because they can increase the rating of online gambling advertisements which are often opened by the general public either to seek information or public services.
The root of the problem lies in the many vulnerabilities in government websites. Although some local governments already have CSIRTs, sometimes they respond when incidents are seen and caught.
Active activities need to be carried out to look for threats that exist in the system or commonly called threat hunting, even if there are sufficient resources to carry out cyber threat intelligence. Where one of them is a unit that is actively seeking information about external threats related to the organization.
He added that it is also necessary to install cyber intelligence threads sensors to detect malware or malicious packages that will attack the system.
Then the most important thing is to create good cyber security governance and implement existing information security standards.
– .