Bjorka's Latest Move: Hacking BPJS Ketenagakerjaan's Data


The hacker Bjorka has resurfaced after a long absence, claiming to have breached personal data from Indonesia. This time, Bjorka claims to have obtained data from the Employment Social Security Organizing Agency (BPJS Ketenagakerjaan).

In an upload on the website on March 12, Bjorka claimed to have accessed the personal information of 19,564,922 BPJS Ketenagakerjaan participants.

To convince viewers of the legitimacy of his claim, Bjorka explained that BPJS Ketenagakerjaan is an institution that provides social security for workers in Indonesia. The leaked data includes participants' names, email addresses, residential numbers, telephone numbers, addresses, dates of birth, genders, occupations, and places of work.

Bjorka also provided 100,000 data samples for free download, but those interested in the complete data set must pay US$10,000 in Bitcoin or BTC currency.

In response to Bjorka's claim, the BPJS Ketenagakerjaan Communication Deputy Oni Marbun said that the agency is verifying the validity of the data.

Additionally, BPJS Ketenagakerjaan is taking preventive measures by strengthening its information technology security system against potential data disruptions through increased system protection and resilience. "As the manager of participant data, we take our responsibility seriously and will follow up on this matter thoroughly," Marbun said.

Register now and get free access.

If you want to get free access to our Daily Insights and Weekly Digest, please click "Sign up" button below. If you already have an account, please login.

What do subscribers receive?

As a subscriber, you'll receive daily insights, weekly business digests, and quarterly industrial reports.

What kind of pieces will i get?

In-depth reports on assumption and impact analysis, as well as update and trends mapping, written by our credible and experienced analysts.

And, there is something else…

Register now and get free access, click here to register. Feel free to contact us with any additional questions you have.