Multiple Government Breaches, Telkom Indonesia Hit in Global Data Leak Wave
Summary
Today's threat landscape is defined by a broad, opportunistic assault on government and critical infrastructure, with Indonesia emerging as a primary target. The volume of alleged breaches -- 70 critical exposures out of 180 total events -- signals a low barrier to entry for attackers, who are leveraging both hacktivist motives and financial gain. Defenders should prioritize patching public-facing web applications and monitoring for credential stuffing, as the diversity of victims suggests automated scanning and exploitation of common vulnerabilities.
Today's developments
The day's most significant activity centers on a sustained campaign against Indonesian government and military entities. Actor Mr. Hanz Xploit is responsible for multiple alleged breaches, including the telecommunications giant Telkom Indonesia, the Ministry of Mahkamah Konstitusi, and several local government bodies such as Kantor Pertanahan Kota Banjar, PPID Kabupaten Pekalongan, and Pemerintah Kabupaten Boyolali. This actor also claims to have breached Google and GameFools in the United States, indicating a wide operational scope.
Government sector under siege: Beyond Indonesia, alleged breaches hit the Land Transportation Office in the Philippines (claimed by Philippine Cyber Alliance), the Supreme Judicial Council of Oman (MashroomBlind), and multiple Brazilian municipalities including Manoel Viana and Ipanema (both claimed by NormalLeVrai). The Municipal Government of Ipanema and Medan City Government (Xyph0rix) further underscore the focus on local administration.
Critical infrastructure and finance: The alleged breach of Telkom Indonesia is particularly concerning given its role in national communications. In the financial sector, claims include a sale of data from Risepay, a Brazilian payment gateway, and a breach of Towerpoint Wealth, LLC in the US (ShinyHunters). The alleged sale of Israeli health insurance records and a database of Chinese people living in the USA highlight the targeting of sensitive personal data.
High-profile claims: Several actors have made attention-grabbing claims against major institutions. Actor Xyph0rix alleges breaches of INTERPOL in Singapore and Sovcombank in Russia. Actor PhotonPool_ claims a breach of NASA, and actor scyth claims a breach of the NSA. While the veracity of these claims is unverified, they generate significant noise and may distract from more credible threats.
Healthcare and education targeted: The healthcare sector saw alleged breaches of Careficient, Inc and Medropolitan in the US, and the National Center for HIV/AIDS, Dermatology and STD in Cambodia. Education was hit with breaches of Follett Software (ShinyHunters), Udayana University, and SMAN 60 Jakarta (both Mr. Hanz Xploit).
Threat landscape signals
The data reveals a clear clustering of activity around a small number of prolific actors. Mr. Hanz Xploit (9 events) and NormalLeVrai (8 events) alone account for nearly 10% of all tracked events, suggesting they may be operating with automated tools or exploiting a common vulnerability. The high number of Data Breach events (60) compared to Ransomware (19) indicates a preference for data exfiltration and extortion without encryption, a trend that reduces operational cost for attackers.
Geographically, the United States remains the top victim country (40 events), but the concentration on Indonesia (13 events) and Israel (18 events) is notable. The targeting of Israeli entities, including health insurance records, alongside claims against the Islamic Revolutionary Guard Corps (IRGC) by the same actor (The BlackH4t MD-Ghost), suggests politically motivated hacktivism. The mix of government, military, and commercial targets in a single day reinforces the need for a unified threat intelligence posture that does not silo sectors.
CTI brief — 1 May 2026
The full brief covers ransomware claims, data leaks and threat actors disclosed on this date. Today's brief is open to all readers; historical editions are part of the subscriber feed.