d573ad8d 3a67 4174 9d90 9d8d2411d939 169 Mitra IT | Your Trusted & Reliable Software Solutions

3,000 Bogor Residents’ Data Stolen, Here’s How the Perpetrators Do It

Jakarta, CNBC Indonesia – Two identity data theft perpetrators were arrested in Bogor City. They are Lukman (51) and Muhamad Rafi (23).

The police revealed that the two perpetrators carried out their actions in order to achieve their target of selling starter cards. Since one year of their actions, the two perpetrators have succeeded in stealing 3,000 data from Bogor City and its surrounding areas.

Colleagues, these perpetrators (Lukman and Pitek) have misused 3,000 identities from Bogor City and its surrounding areas,” said Bogor City Police Chief Kombes Bismo Teguh Prakoso, quoted from Detikcom, Thursday (29/8/2024). “(The perpetrators) have been (in action) for a year,” he added.

This arrest also prevented the theft of 14,000 residents’ data. The stolen data was planned to be used by the perpetrators to register starter cards for one of the providers.

(Then) 14,000 NIK, KK from residents, which were going to be misused (by the perpetrators) we managed to prevent,said Bismo.

This identity data theft is considered very dangerous because it can be misused for other cyber crimes, such as online gambling to illegal online loans.

So of course the misuse of personal data NIK, KK and so on is very dangerous, against the misuse of cyber crime, such as online prostitution, then online gambling, then illegal online loans and other activities,” he explained.

Stealing data via application

Previously reported, two perpetrators Lukman (51) and Muhamad Rafi alias Pitek (23) stole personal data using the hands*** application. The two perpetrators then used other people’s NIK and KK to achieve the target of selling starter cards.

To meet the target (of selling starter cards), the perpetrators used illegal methods, stealing other people’s data using the Hands*** application,” he explained.

Bismo said, in the application there is information data on the NIK of the community. This data is then stolen and used by the perpetrator to register the new SIM card. The perpetrator registers the new SIM card independently as if he has sold the new SIM card to the customer.

(The method) is to insert the SIM card into the cellphone, then a command appears to register, then the perpetrator uses the application so that the NIK data appears. Then the data that appears automatically is used by the perpetrator to register. That’s what the perpetrator does to meet the sales target.” explained Bismo.

SOURCE : CNBC INDONESIA