ank Syariah Indonesia (BSI), a subsidiary of banking state-owned enterprise (SOE) Bank Mandiri, was a victim of extortion, by criminal hacker group LockBit, of data that allegedly belonged to the sharia banking SOE, including employee data, records of about 15 million of its customers and 1.5 terabytes (TB) of internal data. The data breach created by the hacker group after BSI did not cede to LockBit’s demanded ransom over said data could make the bank liable for lawsuits.
The alleged data breach first surfaced on May 11 when BSI CEO Hery Gunardi told a press briefing the bank had found indications of a cyberattack that caused disruptions to the sharia banking SOE’s services from May 8, including its mobile banking, automated teller machines (ATMs) and branch offices. But all of BSI’s services were recovered as of May 11, and he assured BSI clients their funds and data remained safe.
Dark Tracer, an intelligence platform that monitors malicious activities in cyberspace, revealed the data breach on Twitter on May 13. LockBit used the LockBit 3.0 ransomware that blocks user access to computer systems to obtain the alleged BSI data, which included contact details, financial documents, card details and passwords. The hacker group demanded the bank management contact them to negotiate before 4:09 a.m. on May 16; otherwise, they would release all the data on the dark web.
Dark Tracer also posted a screenshot on Twitter of chat logs allegedly related to a negotiation between LockBit and BSI in which the group demanded a ransom of US$20 million. After the negotiation collapsed, LockBit proceeded to publish some samples of the data they claimed to have stolen from BSI on the dark web on May 16 while keeping those the criminal hacker group judged to be the most interesting for further “exploitation”.
A probable factor contributing to LockBit and BSI failing to achieve an agreement in the alleged negotiation is the fact there was no guarantee the criminal hacker group would honor the agreement and refrain from leaking the data on the dark web nevertheless. Either way, the sharia banking SOE must contend with the fact that a criminal group has irreversible access to sensitive data. Moreover, the leaked data means BSI clients are under greater threat from cyberattacks and scams.
The data breach made BSI potentially liable for a lawsuit by violating Law No. 27/2022 on Personal Data Protection. Although BSI could avoid paying a potential administrative fine stipulated by the regulation at 2 percent of firms’ annual revenue due to the law’s two-year grace period, as stipulated by Article 70 of Law No. 27/2022, it could still be forced to pay up to 10 times the fines charged for the criminal offense for failing to protect its clients’ data.
What’s more
Share your experiences, suggestions, and any issues you've encountered on The Jakarta Post. We're here to listen.
Thank you for sharing your thoughts. We appreciate your feedback.
Quickly share this news with your network—keep everyone informed with just a single click!
Share the best of The Jakarta Post with friends, family, or colleagues. As a subscriber, you can gift 3 to 5 articles each month that anyone can read—no subscription needed!
Get the best experience—faster access, exclusive features, and a seamless way to stay updated.