💡This post is part of Free Post Friday! If you're interested in subscribing to the platform please visit the subscriber page: https://darkwebinformer.com/status/#/portal/signup. If you would prefer to pay via cryptocurrency, please visit: https://darkwebinformer.com/crypto-payments
If you're interested in advertising please visit: https://darkwebinformer.com/advertising-rates/
🔎 Quick Facts
🔗 DarkWebInformer.com - Cyber Threat Intelligence
📅 Date: 2025-02-21 17:15:23
🚨 Title: Alleged Database Leak of Constitutional Court of Indonesia
🛡️ Victim Country: Indonesia
🏭 Victim Industry: Judiciary
🏢 Victim Organization: Constitutional Court of Indonesia
🌐 Victim Site: mkri.id
📜 Category: Data Breach
🔗 Claim: https://breachforums.st/Thread-DATABASE-database-nik-name-mkri-id
🕵️♂️ Threat Actor: BanyuwangiXploit
🌍 Network: OpenWeb
📝 What Happened?
A threat actor known as BanyuwangiXploit has claimed to have leaked a database belonging to the Constitutional Court of Indonesia (Mahkamah Konstitusi Republik Indonesia - MKRI).
Key data allegedly compromised includes:
- NIK (National Identification Number) records
- Full names and addresses
- Kelurahan (sub-district) details
- 97.59MB of extracted data
The leak appears to contain sensitive citizen information, with the actor specifically mentioning political figures among the records.
📊 Compromised Access Details
- Personal Identification Information (NIK, Names, Addresses, etc.)
- Potential Exposure of Governmental/Political Figures
- Judiciary Records & Associated Data Risks

🛡 WhiteIntel.io Data Leak Information
Large datasets may take a moment...
This message will update automatically...
⚠ Implications
- Privacy Risks: Exposure of citizen identity data may lead to identity fraud
- Political & Social Impact: Inclusion of high-profile names may create political tensions
- National Security Threat: Judicial data leaks could be exploited for further cyberattacks
🔧 Recommended Actions
- Immediate Cybersecurity Investigation – Review network logs & restrict unauthorized access
- Public Communication Strategy – Issue an advisory on potential identity theft risks
- Governmental Intervention – Involve cybercrime units for attribution & takedown requests
- Dark Web Monitoring – Track for further leaked files & data sales
⚠ Stay informed on emerging cyber threats. Visit DarkWebInformer.com for real-time updates on security risks and breaches.