Technical Analysis of Government Website Takeovers by Online Gambling Sites in Indonesia
Journal: International Journal of Progressive Sciences and Technologies (IJPSAT) (Vol.51, No. 2)Publication Date: 2025-07-07
Authors : Ni Luh Liberty; Mohammad Syahman; H A Rimbawa; Bisyron -;
Page : 149-167
Keywords : website defacement; .go.id domains; online gambling; cybersecurity; SQL Injection; XSS; Indonesian law; cyber governance.;
Abstract
This research explores a pressing intersection between cybersecurity and public governance: the systematic hijacking of Indonesian government websites (.go.id domains) by online gambling actors. At the heart of the problem lie well-known yet persistently unaddressed vulnerabilities—SQL Injection, Cross-Site Scripting (XSS), outdated content management systems, and weak input validation—all of which enable attackers to deface official pages, implant backdoors, and redirect citizens to illicit platforms. This study proposes a twofold solution: technical hardening through automated vulnerability scans and patch management, and regulatory strengthening via targeted reform of Indonesia’s cyber law framework, particularly the Undang-Undang Informasi dan Transaksi Elektronik (UU ITE). Methodologically, the paper employs a triadic framework—combining real-world case study analysis, legal evaluation, and scholarly synthesis—to interrogate both the technological vectors of attack and the regulatory inertia that follows. Case examples, such as the 2022 defacement of the Jawa Timur website and the 2023 SQL breach of a ministry portal, illustrate both the ease of compromise and the inadequacy of state responses. The literature supports these findings: Albalawi et al. (2022) emphasise the technical detectability of defacement, while Djarawula et al. (2023) and Setiawati et al. (2022) point to legislative gaps that online criminals exploit with relative impunity. The study’s contribution lies in articulating an integrated model for national cyber resilience, bridging technical diagnostics with legal strategy. It concludes with a set of practical recommendations—ranging from near-term vulnerability audits and IT training to long-term legal reform and international collaboration—intended not only to protect Indonesia’s digital assets but also to offer a case study of wider relevance for states confronting similar threats in the evolving cyber landscape.
Other Latest Articles
- Extracellular Matrix and Angiogenesis in the Uterine Myometrium and Small Growing Leiomyomas in Women of Reproductive Age
- Classification of tropical cyclones observed by satellites in the Southwest Indian Ocean basin using the 2D-CNN model
- Causes De Justification D’une Infraction En Droit Face A La Lutte Contre L’impunité En République Démocratique Du Congo
- Problématique Du Respect Des Normes Urbanistiques : Etude Menée Dans La Ville De Kindu De 2023 A 2024
- Refléxion Sur L’introversion De L’économie Congolaise Et Perspectives De Développement.
Last modified: 2025-08-24 21:29:24