Ransomware victim disclosure
← All victimsKementerian Pertanian
Claimed by coinbasecartel · listed 28 days ago
Status timeline
- Listed
Apr 23, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- ID
- Listed on leak site
- Apr 23, 2026
About the victim
AI dossier — public-source company profileKementerian Pertanian (Ministry of Agriculture of the Republic of Indonesia) is the central government ministry responsible for formulating and implementing national agricultural policy, covering food crops, horticulture, livestock, and plantation sectors. It coordinates food security programs, farmer welfare initiatives, and agricultural export promotion across Indonesia's regional agricultural agencies. The ministry maintains extensive databases on agricultural personnel, subsidy recipients, land and irrigation data, and agricultural commodity pricing.
- Industry
- Government – Agricultural Policy & Administration
- Address
- Jalan Harsono RM No. 3, Ragunan, Jakarta Selatan, DKI Jakarta, Indonesia
Attack summary
Severity: high — The victim is a national government ministry with data published (confirmed exfiltration). The ministry holds significant volumes of government personnel records, subsidy recipient PII, official financial disclosures, and sensitive agricultural policy data. While not classified as critical infrastructure in a defence/medical sense, a confirmed data publication against a sovereign government institution with PII at scale warrants a high severity rating.The coinbasecartel ransomware group claims to have published data belonging to Kementerian Pertanian; the disclosure status is listed as 'data_published', indicating exfiltration and public release of data, though no specific ransom demand or data volume has been stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Employee records (DATA PEGAWAI)
- Agricultural subsidy recipient data
- Agricultural commodity pricing information
- Import/export data
- Organizational and personnel directories
- Public official wealth declarations (LHKPN/LHKASN)
- Agricultural licensing information
- Regional agricultural office contact data
- Agricultural extension worker transfer data
Original description
AI-summarised, not from the leak postKementerian Pertanian is the Ministry of Agriculture of Indonesia, a government institution responsible for formulating and implementing agricultural policies. It oversees food crop production, horticulture, livestock, and plantation sectors. The ministry aims to achieve national food security, improve farmer welfare, and boost agricultural exports. It operates under the Indonesian central government and coordinates with regional agricultural agencies across the country.
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 28 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
