Hacker Bjorka And Regulatory Regulatory For Cyber Data Protection In Indonesia
According to a report by cybersecurity firm Kaspersky, cyberattack intensity in Indonesia will increase by 22 percent in 2022 compared to 2021. (Gerd Altmann/Pixabay)

JAKARTA - Cyberattacks and data leaks that often occur in Indonesia indicate that the cybersecurity system currently implemented is still very weak. Even Information Security Expert Gildas Deograt Lumy said that when measuring through the lowest scale of level 1 and the highest level 10, Indonesia was still at level 3.

"Even then, we have been assisted through prayer," said Gildas jokingly.

No wonder hackers Bjorka continue to challenge the Indonesian government by dozing several officials, starting from the Minister of Communications and Informatics Johnny G Plate, Chairman of the Indonesian House of Representatives Puan Maharani, Minister of SOEs Erick Thohir, Coordinating Minister for Maritime Affairs Luhut Binsar Panjaitan, Governor of DKI Jakarta Anies Baswedan, to Minister of Home Affairs Tito Karnavian.

In fact, hacker Bjorka also threatened to disclose confidential data belonging to state intelligence, including secret letters sent to President Jokowi.

Minister of Communications and Informatics Johnny G Plate said the government was ready to form a task force to anticipate cyber attacks. Consisting of various elements, such as BSSN, Kemenkominfo, Polri, to BIN. (BPMI Setpres/Rusman)

However, Johnny claims that the state's secret data is still safe. The ones that are leaked to the public are public data.

"After being reviewed temporarily, the data is common, not specific data and not data that is updated now, some of the old data for now," Johnny said in a statement quoted from the Presidential Secretariat on September 12, 2022.

However, that does not mean being careless. The government is also ready to form a task force consisting of various elements, such as the National Cyber and Crypto Agency (BSSN), the Ministry of Communication and Information Technology, the Indonesian National Police, to the State Intelligence Agency (BIN).

There needs to be an emergency response team that is related to maintaining good governance in Indonesia to maintain public trust. So there will be an emergency response team from BSSN, Kominfo, Polri, and BIN to carry out the next assessments," he said.

After all, building national powers is a shared task, especially in the digital era. Digital crime has a bigger impact, can divide the nation and undermine the morals and public trust in the government.

This is what we have to protect together, build work together. We have different opinions, that is normal in democracy, respected in democracy. But at a time when it is in the interests of the state as a whole, let us maintain cohesiveness," said the Minister of Communication and Information.

Based on a report by cybersecurity firm Kaspersky, in the January-March 2022 period alone, Kaspersky products detected and blocked 11,802,558 different cyberattacks in Indonesia. This number increased by 22 percent compared to the same period last year, 9,639,740 cyberattacks in 2021.

Meanwhile, data from the National Cyber and Crypto Agency (BSSN) states that the figure is higher, there were 714,170,960 million cyber attacks in the first half of 2022. The highest occurred in January which reached 272,962,734 million attacks. The dominant cyberattack was ransomware or malware with the mode of asking for ransom.

Then, in August 2022, there will be another cyber attack. A total of 26 million Indihome user data, 17 million PLN customer data, 1.3 billion mobile SIM card user data in Indonesia, and data from the General Elections Commission (KPU) were leaked and traded at the Breached Forums by hacker Bjorka.

Who is responsible? Each party throws each other responsibilities.

According to the Head of the Cyber Communication & Information System Security Research Center, Pratama Pershada, it indicates that data governance in Indonesia is still a bit problematic. Regulations related to personal data protection are still weak.

The manager should be responsible for the data leak. For example, the Ministry of Health stores PeduliLindung data. If the data is leaked, they should be responsible," said Pratama as quoted by Katadata, Tuesday (13/9).

Likewise with the leaked 1.3 billion datasim cardphones. It should be stored in cellular operators and data storage centers.

"So, the most responsible Electronic System Operator (PSE)," he said.

That's why the Personal Data Protection Act (UU PDP) is so important, so there are regulations for each Electronic System Organizer to secure the system they have.

The Personal Data Protection Law has been ratified at level I by the Indonesian House of Representatives and will soon be ratified at level II through a plenary session. The formation of the task force is also one of the mandates of this PDP Law," said Coordinating Minister for Political, Legal and Security Affairs Mahfud MD to the media crew, Wednesday (14/9).

Gildas Deograt Lumy believes that the crime in order to be carried out can still be revealed. It is not difficult to reveal who the hackers are. However, it still takes a process. How long depends on the perpetrator's behavior.

If it isdarkweb, the concept is like an onion layer. We go into one gate, go out to another layer, layer by layer, after that only comes out on another gateway. So, when the IP address comes out, it can be five 2c (already mutated.). It took a long time but some cases, although the crime on the darkweb can still be revealed," said Gildas on the broadcast on YouTube Deddy Corbuzier, Wednesday (14/9).

Gildas also suspects that hacker Bjorka is from Indonesia, not from Poland as previously informed.

"At least not Indonesians. For cases of 1.3 billion data, Bjorka also buys from others, not hackers. This has been traced," he said.


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)