Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
US$72 billion leakage at checkout
SU Group Announces Pricing of $6 Million Public Offering
Fraudulent Android apps offers illegal data retrieval service to milli...
Taiwan high-speed rail spoofing case exposes OT governance gaps, not i...
Linux kernel zero day enables root privilege escalation across most di...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Monday, May 11, 2026, 8:30 AM Asia/Singapore | Features
    • Featured

      The problem with CAPTCHAs – and the password perception gap

      The problem with CAPTCHAs - and the password perception gap

      Thursday, May 7, 2026, 11:14 AM Asia/Singapore | Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Directory
  • E-Learning

Select Page

News

Indonesian government refuses to pay US$8m ransom to Lockbit 3.0 threat group         

By CybersecAsia editors | Wednesday, June 26, 2024, 11:14 AM Asia/Singapore

Indonesian government refuses to pay US$8m ransom to Lockbit 3.0 threat group         

The country’s communications-and-Informatics ministry is progressively restoring disrupted public services and attempting to recover the now-locked national data centre assets

A ransomware attack on Indonesia’s national data center has caused widespread disruption to the country’s public services since 20 June 2024, with officials working to restore operations.

The attackers have asked for US$8m before they will offer an access key to the encrypted stolen data, but according to the Director General of Informatics Applications (Communications and Informatics Ministry) the government will not pay the ransom, and will try to break the Lockbit 3.0 encryption. Forensic investigations are also being performed by the country’s National Cyber and Crypto Agency.

Industry experts have generally lauded the firm decision to desist from ransom payment. Nigel Ng, Senior Vice President (Asia Pacific and Japan), Tenable: “This incident highlights the critical importance of continuous monitoring and real-time threat detection to mitigate the impact of such sophisticated attacks. Furthermore, this situation exemplifies the necessity for robust collaboration between government agencies and private sector companies. Through shared expertise and coordinated efforts, we can enhance our defenses against these persistent threats and build a more resilient digital infrastructure capable of withstanding future cyberattacks.”

Cybersecurity expert Anne Cutler of Keeper Security noted: “Although the investigation is still underway into how threat actors were able to successfully deploy the Lockbit ransomware, human error remains a significant weakness for organizations.”

While the most obvious widespread concern is how the attack impacts the image of a national agency focused on sensitive national digital data, industry observers have also noted the government’s openness and responsiveness in disclosing and managing the attack. Kelvin Lim, Senior Director (Security Engineering) Synopsys Software Integrity Group, noted: “Paying the ransom does not ensure that threat actors won’t release your data, (or ensure) that the data will be decrypted. (They) can also consider you as a soft target and launch another attack in the future.” 

Meanwhile, the notorious Lockbit 3.0 threat actors have claimed the attack on the US’s Federal Reserve, and have threatened to release the 33TB of “American’s banking secrets” and demanded the sacking of the Feds’ ransom negotiator.

Share:

PreviousMore than 150,000 money laundering accounts detected in APAC
NextIs effective cybersecurity a one-dimensional goal — to stop attacks at the door?

Related Posts

What do educational institutions do when hit by ransomware?

What do educational institutions do when hit by ransomware?

Friday, July 28, 2023

Securing autonomous AI systems requires proactive, multi-layered cybersecurity strategies

Securing autonomous AI systems requires proactive, multi-layered cybersecurity strategies

Wednesday, November 5, 2025

Two more malicious apps sneak past Android’s official app store

Two more malicious apps sneak past Android’s official app store

Monday, November 15, 2021

Phishing content can now contain three novel ways to evade AI filters

Phishing content can now contain three novel ways to evade AI filters

Tuesday, March 21, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • SU Group Announces Pricing of $6 Million Public Offering

    Tuesday, May 12, 2026
    HONG KONG, May 12, 2026 …Read More »
  • VIVOTEK AI Solutions Enhance Efficiency at Traffic Hubs in Norway

    Wednesday, May 6, 2026
    TAIPEI, May 6, 2026 /PRNewswire/ …Read More »
  • Taoping Reports Fiscal Year 2025 Results

    Thursday, April 30, 2026
    Strategic Transformation Drives Platform Expansion, …Read More »
  • DESILO Launches World’s First Fully Homomorphic Encryption Library Integrating 5th-Generation FHE Scheme ‘GL’, Accelerating the Era of Private AI

    Tuesday, April 28, 2026
    SEOUL, South Korea, April 28, …Read More »
  • Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Breakthroughs Enabling Large-Scale Agent Deployment

    Thursday, April 23, 2026
    Tencent Cloud’s Cube Sandbox goes …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.