Dugaan Kebocoran Database HRIS Qualita Indonesia di Darkweb
BREAKING: Database HRIS Qualita Indonesia Bocor di Darkweb
Informasi Kebocoran
| Item | Detail |
|---|---|
| Sumber | Darkweb |
| Ukuran Data | ~150MB |
| Format | SQL Ready-to-use |
| Jenis Data | Tabel user - 1000+ records |
| Domain | hris.qualita-indonesia.net |
| Cracked by | DBHunter |
Struktur Data yang Bocor
| Kolom | Deskripsi | | id | Unique ID user | | id_group | Group/Departemen | | username | Akun login | | password MD5 | Hash password | | id_employ | ID Karyawan | | name | Nama lengkap | | email | Email | | active | Status akun (1=aktif) | | reset_password | Indikator reset password | | sysinfo | Log aktivitas sistem |
Bukti Data (Sample)
id,id_group,username,password_md5,id_employ,name,email,active,reset_password
1,1,andika2000,b0070xxxxxxxxx21b7a877f,1,Andika Gumelar [email protected],1,0
2,1,moegie,ec894178bxxxxxxxxx5fb83d6f4f1,26,Ade [email protected],1,0
42,30,stevanus,c4axxxxxxxxx46b61e5315858f9,624,[email protected],1,0
73,38,zein,6dc7c46xxxxxxxxxa25d3f6,472,[email protected],1,0
92,34,nyoto,14e0xxxxxxxxx9490e144,524,[email protected],1,0
96,47,adina,6d620xxxxxxxxx5638fc049,1302,[email protected],1,0
115,48,andreas,33663xxxxxxxxxa1e615f,120,[email protected],1,0
116,44,reza,c30exxxxxxxxx3a8cb0,562,[email protected],1,0
144,56,wahyudi,7a470xxxxxxxxx568c8,678,[email protected],1,0
313,47,rizky,43aaa8xxxxxxxxx555a29,1196,[email protected],1,0
Password Hash Analysis
Beberapa hash teridentifikasi memiliki pola umum:
| Username | Hash | Keterangan | | (multiple) | 7a4701xxxxxxxxx568c8 | MD5 umum | (multiple) | c7020597xxxxxxxxx7bc6d | MD5 umum | soft | 21232f2xxxxxxxxx01fc3 | admin (MD5) |
Hash 212xxxxxxxxx1fc3 = md5(‘admin’) - banyak akun menggunakan password default.
Dampak
- Ribuan akun karyawan terekspos termasuk username, nama, dan email
- Password menggunakan MD5 tanpa salt - mudah di-reverse
- Akun aktif (active:1) artinya masih bisa digunakan untuk login
- Banyak akun menggunakan password yang sama (indikasi password default)
Rekomendasi
- Segera lakukan forced password reset untuk seluruh akun
- Migrasi dari MD5 ke bcrypt/argon2
- Audit akses database - cari tahu source kebocoran
- Cek apakah ada akses mencurigakan di log aktivitas (sysinfo)