Data Breach ▲ TINGGI

Dugaan Kebocoran Database HRIS Qualita Indonesia di Darkweb

18 Mei 2026 Seraphim News 5 mnt baca
🟠 CONFIRMED HRIS DATA BREACH

BREAKING: Database HRIS Qualita Indonesia Bocor di Darkweb

Informasi Kebocoran

ItemDetail
SumberDarkweb
Ukuran Data~150MB
FormatSQL Ready-to-use
Jenis DataTabel user - 1000+ records
Domainhris.qualita-indonesia.net
Cracked byDBHunter

Struktur Data yang Bocor

| Kolom | Deskripsi | | id | Unique ID user | | id_group | Group/Departemen | | username | Akun login | | password MD5 | Hash password | | id_employ | ID Karyawan | | name | Nama lengkap | | email | Email | | active | Status akun (1=aktif) | | reset_password | Indikator reset password | | sysinfo | Log aktivitas sistem |

Bukti Data (Sample)

id,id_group,username,password_md5,id_employ,name,email,active,reset_password
1,1,andika2000,b0070xxxxxxxxx21b7a877f,1,Andika Gumelar [email protected],1,0
2,1,moegie,ec894178bxxxxxxxxx5fb83d6f4f1,26,Ade [email protected],1,0
42,30,stevanus,c4axxxxxxxxx46b61e5315858f9,624,[email protected],1,0
73,38,zein,6dc7c46xxxxxxxxxa25d3f6,472,[email protected],1,0
92,34,nyoto,14e0xxxxxxxxx9490e144,524,[email protected],1,0
96,47,adina,6d620xxxxxxxxx5638fc049,1302,[email protected],1,0
115,48,andreas,33663xxxxxxxxxa1e615f,120,[email protected],1,0
116,44,reza,c30exxxxxxxxx3a8cb0,562,[email protected],1,0
144,56,wahyudi,7a470xxxxxxxxx568c8,678,[email protected],1,0
313,47,rizky,43aaa8xxxxxxxxx555a29,1196,[email protected],1,0

Password Hash Analysis

Beberapa hash teridentifikasi memiliki pola umum:

| Username | Hash | Keterangan | | (multiple) | 7a4701xxxxxxxxx568c8 | MD5 umum | (multiple) | c7020597xxxxxxxxx7bc6d | MD5 umum | soft | 21232f2xxxxxxxxx01fc3 | admin (MD5) |

Hash 212xxxxxxxxx1fc3 = md5(‘admin’) - banyak akun menggunakan password default.

Dampak

  • Ribuan akun karyawan terekspos termasuk username, nama, dan email
  • Password menggunakan MD5 tanpa salt - mudah di-reverse
  • Akun aktif (active:1) artinya masih bisa digunakan untuk login
  • Banyak akun menggunakan password yang sama (indikasi password default)

Rekomendasi

  1. Segera lakukan forced password reset untuk seluruh akun
  2. Migrasi dari MD5 ke bcrypt/argon2
  3. Audit akses database - cari tahu source kebocoran
  4. Cek apakah ada akses mencurigakan di log aktivitas (sysinfo)
Powered by Seraphim Engine