Threat Actor Characterization
KONCO ERROR SYSTEM
ID: ad41dfac8a37b1794d48653a8ee84f4722766| KONCO EROR SYSTEM | KONCO ERROR SYTEM | Ko******** | Ko************** |
| Ko******************* | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
KONCO ERROR SYSTEM is assessed as an Indonesian Telegram-centered leak and opportunistic intrusion persona. Public evidence points to resident-data leak promotion, SQLi-adjacent activity, and alliance signaling with adjacent Indonesian actors rather than to a mature ransomware operation.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1213 | Data from Information Repositories | TA0009 |
|
| T1505.003 | Web Shell | TA0003 |
|
| T1585 | Establish Accounts | TA0042 |
|
KONCO ERROR SYSTEM — Indonesian Telegram leak / intrusion persona
Classification: TLP:WHITE - Open Source Intelligence (OSINT)
Category: Cybercrime / Data Leak & Intrusion Persona - Origin: Indonesia (assessed)
Author: iQBlack CTI Team
Executive Summary
OSINT [B2]: KONCO ERROR SYSTEM appears to be a small Indonesian cyber persona or channel-centered actor active mainly on Telegram, with public behavior centered on data-leak claims, low-end intrusion bragging, challenge-style SQL injection posts, and amplification of compromised-data releases. Publicly visible evidence does not currently support classification as a mature ransomware program despite the noisy branding.
OSINT [B2]: The strongest observable signals are the Telegram channel footprint, alliance messaging involving PetrusNism, publicly advertised leak content tied to Indonesian resident data, and companion contact/payment markers including TOX, Session, Telegram, and cryptocurrency wallets. These features are more consistent with a leak-and-exposure ecosystem actor than with a well-documented encryption-focused extortion operation.
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview