The Killsec ransomware group has listed WalletKu Indompet Indonesia, an Indonesian financial technology (FinTech) company, as its latest victim. In a claim made on an underground forum, the group asserts it has breached the digital payment platform and exfiltrated sensitive data. WalletKu serves micro, small, and medium enterprises (MSMEs) in Indonesia, often acting as a primary financial tool for the underbanked. The breach is particularly severe as the attackers claim to have stolen a large volume of Know Your Customer (KYC) data. Proof-of-hack images shared by the group allegedly show customer photos with their government ID cards, indicating the exposure of full names, identification documents, dates of birth, and addresses. This incident places WalletKu's customers at high risk of identity theft and financial fraud and underscores the increasing focus of ransomware actors on the data-rich FinTech sector.
This attack follows the double-extortion model, where the value for the attackers lies not just in encrypting the victim's systems but in the threat of releasing the sensitive data they have stolen. For a financial service, KYC data is among the most sensitive information it holds.
The exposed data reportedly includes:
The initial access vector and specific TTPs used in the WalletKu breach have not been publicly disclosed. However, the attack pattern is characteristic of ransomware-as-a-service (RaaS) operations targeting enterprises.
T1486 - Data Encrypted for Impact: While not explicitly stated that files were encrypted, it is the primary function of a ransomware group like Killsec.T1213 - Data from Information Repositories: The attackers specifically targeted and exfiltrated structured data, likely from customer databases containing KYC information.T1567 - Exfiltration Over Web Service: The stolen data would have been exfiltrated to attacker-controlled cloud storage or servers before any encryption took place.T1657 - Financial Theft: The stolen KYC data is a precursor to financial theft, either by using it to defraud the original victims or by selling it to other criminals.The business impact on WalletKu is significant, including potential regulatory fines, loss of customer trust, and brand damage. However, the most severe impact is on the customers whose data was stolen.
This incident highlights the systemic risk posed by attacks on FinTech platforms, especially those serving vulnerable populations like MSMEs.
Observables for this specific breach are not public. General observables for detecting similar attacks include:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| network_traffic_pattern | Large, anomalous outbound data transfer from database servers |
A key indicator of data exfiltration before a ransomware attack. | Netflow analysis, NIDS, Firewall logs | high |
| process_name | rclone.exe |
A legitimate tool often abused by ransomware groups to exfiltrate large volumes of data to cloud storage. | EDR, Process monitoring | high |
| other | Ransomware notes or file extension changes |
The classic signs of a ransomware payload being deployed after data has been stolen. | FIM, EDR | high |
Encrypt sensitive data like KYC documents at rest in the database to add a layer of protection.
Mapped D3FEND Techniques:
Isolate databases containing sensitive customer data into a highly restricted network zone.
Mapped D3FEND Techniques:
Apply the principle of least privilege to file and database access, ensuring service accounts cannot perform mass data exports.
Mapped D3FEND Techniques:
To prevent a mass theft of customer data like the one at WalletKu, organizations must implement User Data Transfer Analysis, often through a Data Loss Prevention (DLP) solution. This system should be configured to monitor and control the flow of sensitive data, particularly KYC information. Create policies that baseline normal data access and alert or block any anomalous activity, such as a single service account attempting to download thousands of customer records or a large volume of data containing ID numbers being transferred out of the secure database zone. This detective and preventative control acts as a last line of defense against data exfiltration, even if an attacker has gained access to the network.
For a FinTech firm like WalletKu, whose crown jewels are in its customer database, Database Activity Monitoring (DAM) is a non-negotiable security control. A DAM solution should be deployed to provide deep visibility into all database transactions. It should be configured to alert on suspicious queries that are indicative of a breach, such as SELECT * FROM customers or queries that access an unusually high number of rows. By monitoring database activity in real-time, security teams can detect an attacker in the collection phase of their attack, before the data is even exfiltrated, allowing for a much faster incident response.
While attackers may have gained access to the system, strong encryption of the data itself can provide a crucial final layer of defense. For WalletKu, this means not just encrypting the database at rest, but also implementing application-level or field-level encryption for the most sensitive data, such as the stored KYC document images. The decryption keys should be managed in a separate, hardened Hardware Security Module (HSM) or key management service. This ensures that even if an attacker manages to exfiltrate the raw database files, the most sensitive data remains encrypted and useless to them without a separate, successful attack on the key management infrastructure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats