Self Assessment

EXECUTIVE THREAT LANDSCAPE REPORT INDONESIA

Published On : 2025-04-03
Share :
EXECUTIVE THREAT LANDSCAPE REPORT INDONESIA

Why Cyber Threat Actors Target Indonesia?

  • Strategic Economic Powerhouse: As Southeast Asia’s largest economy and a G20 member, Indonesia presents a lucrative target for financially motivated and state-backed cyber actors.
  • Geopolitical Importance: Its strategic position in the Indo-Pacific makes Indonesia a focal point for cyber espionage amid rising regional tensions, especially involving China, the U.S., and Australia.
  • Rapid Digital Growth: Accelerated digitalization across public and private sectors expands the attack surface, often outpacing security capabilities.
  • Key Industry Exposure: Critical sectors like finance, energy, and telecommunications face heightened targeting due to their economic value and role in national stability.
  • Cyber Hygiene Challenges: Widespread use of unsecured systems and low user awareness provide easy entry points for phishing, malware, and credential theft.
  • Regulatory Gaps & Legacy Infrastructure: Inconsistent enforcement of cybersecurity laws and outdated systems create exploitable vulnerabilities.

Geopolitical Risk Factors Driving Cyber Threats in Indonesia

  • Indo-Pacific Tensions: Indonesia’s strategic location amid rising U.S.-China rivalry increases its exposure to cyber espionage and influence operations from state-backed actors.
  • South China Sea Disputes: Although not a direct claimant, Indonesia’s defense of its Natuna waters invites cyber pressure and surveillance from regional powers.
  • Regional Cyber Proxy Zone: Threat actors may exploit Indonesia as a low-risk staging ground for launching campaigns across ASEAN, leveraging jurisdictional complexity and legal loopholes.
  • Increased Defense Cooperation with Western Allies: Growing military and cybersecurity ties with countries like the U.S., Australia, and Japan may attract retaliatory cyber activities from rival states or proxies.
  • Participation in Regional Security Forums: Involvement in forums like ASEAN and the Quad Cybersecurity Working Group makes Indonesia a target for actors seeking to disrupt multilateral cooperation.
  • Digital Sovereignty & Data Localization Push: Indonesia’s efforts to assert digital sovereignty and control over data flows may trigger friction with global tech powers, inviting politically motivated cyber pressure.
  • Strategic Technology Dependencies: Reliance on foreign technologies, including Chinese and Western infrastructure, creates dual-risk exposure from both supply chain compromises and geopolitical tech conflicts.

Trends From The Dark Web

CYFIRMA observed a rising trend in cyber threat campaigns targeting Indonesia, with a peak in 2024. This escalation highlights Indonesia’s growing geopolitical and economic significance, making it a prime target for both financially motivated and state-sponsored cyber actors. The fluctuations in attack campaigns suggest evolving adversary tactics, requiring proactive intelligence-driven defenses to mitigate emerging threats.

CYFIRMA Observed Campaigns Targeting Indonesia

CYFIRMA’s intelligence reveals a diverse set of cyber threat actors targeting Indonesia, including state-sponsored APTs (Lazarus Group, Gothic Panda, Fancy Bear) and financially motivated groups (TA505, FIN7, FIN11). The presence of Chinese, Russian, and North Korean-linked actors suggests a mix of espionage, financial crime, and strategic cyber operations. The dominance of MISSION2025 signals a sustained, structured campaign requiring heightened vigilance.

Suspected Threat Actors Targeting Indonesia

CYFIRMA’s analysis highlights that threat actors targeting Indonesia originate from diverse geopolitical landscapes, with two dominant sources each contributing 36.84% of observed campaigns. This indicates a mix of state-sponsored cyber espionage and financially motivated operations, leveraging Indonesia’s strategic position in the Indo-Pacific. The distribution of smaller threat actor clusters suggests a dynamic and evolving cyber threat environment.

Threat Actor Origins Targeting Indonesia

In the CYFIRMA observed campaigns web applications are the primary target for cyber threat actors, accounting for the vast majority of attacks. This highlights a critical exposure in Indonesia’s digital infrastructure, especially across finance, e-commerce, and government services. Operating systems and routers also remain key entry points, reinforcing the need for robust patching, secure configurations, and zero-trust architecture.

Top Attacked Technology

CYFIRMA’s telemetry shows widespread use of commodity and custom malware by threat actors targeting Indonesia, with prominent families like Emotet, Cl0p Ransomware, and Winnti observed. The mix of financial, espionage, and infrastructure-targeting malware highlights the multi-motive nature of attacks. The presence of tools like Cobalt Strike and FlawedAmmy RAT signals advanced post-exploitation activity.

Observed Malware

CYFIRMA’s analysis highlights that Financial Services, Industrial Conglomerates, Government, and IT Services are the most frequently targeted sectors in Indonesia, signaling adversaries’ focus on high-value, high-interconnectivity industries. The spread of attacks across critical infrastructure, energy, and defense highlights broad exposure across both economic and national security domains.

Top Targeted Industries in Indonesia

Ransomware

Year-to-Year Elevation: High

In 2023, CYFIRMA recorded 4,723 verified ransomware victims, while in 2024, the number increased to 5,123, representing an 8.5% year-over-year growth across all industries.

Ransomware Groups Targeting Indonesia

CYFIRMA’s analysis reveals that ransomware attacks in Indonesia are sector-agnostic but economically motivated, with the Consumer Goods, Finance, and Logistics sectors among the most targeted. Critical industries such as Energy, IT, and Manufacturing also face sustained attacks, indicating adversaries’ focus on sectors with high operational disruption impact. The targeting of government and civic sectors further highlights a strategic shift toward national infrastructure and public trust erosion.

In early 2023, the takedown of Hive caused a temporary slowdown in ransomware activity. However, this was followed by a surge driven by Cl0p, leveraging the MOVEit vulnerability.

Similarly, the early 2024 slowdown caused by the LockBit3 takedown was short-lived, as affiliates switched to other Ransomware-as-a-Service (RaaS) and RansomHub quickly emerged to fill the void in the RaaS ecosystem.

As of March 2025, 11 incidents have already been recorded — a concerning figure when viewed in the context of quarterly trends. This early activity indicates that 2025 is on track to mirror or exceed previous years if this trajectory continues.

Ransomware Victims in Indonesia

CYFIRMA’s assessment highlights that LockBit3, Alphv, and emerging groups like RansomHub are the most active ransomware operators targeting Indonesia. The presence of multiple small and mid-sized groups reflects a fragmented yet persistent threat landscape, fueled by the Ransomware-as-a-Service (RaaS) ecosystem. This diversification increases the complexity of defense.

Industries Targeted by Ransomware – Indonesia

Emerging Trends in Indonesia’s Cyber Threat Landscape

Surge in Targeted Ransomware Attacks
Ransomware attacks are increasingly targeting key Indonesian industries, including finance, manufacturing, and government sectors — fueled by the rise of Ransomware-as-a-Service (RaaS) and affiliate diversification.

State-Backed Cyber Espionage Operations
Persistent cyber espionage activities were observed, primarily from China, North Korea, and Russia-linked groups, focusing on geopolitical intelligence, defense, and critical infrastructure sectors.

Growing Threat to Digital Supply Chains
Adversaries are exploiting third-party vendors, IT service providers, and open-source software used by Indonesian organizations, creating indirect attack paths.

Targeting of Critical Infrastructure & National Assets
Increased focus on energy, transportation, and civic sectors, indicates an adversarial shift towards nation-state-level disruption and destabilization campaigns.

Weaponization of Commodity Malware and Tools
Widespread use of off-the-shelf malware (e.g., Emotet, Cobalt Strike) and living-off-the-land techniques to bypass traditional defenses and maintain stealth.

Phishing & Credential Theft Surge
High-volume phishing campaigns and credential harvesting are targeting both citizens and corporate employees, exploiting Indonesia’s large digital population and low cyber hygiene levels.

Emergence of Data Leak Markets
The surge in data breaches and leaks of Indonesian citizen, financial, and government data on dark web marketplaces is increasing risks of fraud, identity theft, and cyber extortion.

Tactical Shift Post-Law Enforcement Actions
Ransomware and cybercrime groups adapt quickly to global crackdowns, rebranding and resurfacing under new names — indicating a resilient and evolving adversary ecosystem.