Submitted:
23 December 2024
Posted:
25 December 2024
You are already at the latest version
Abstract
Keywords:
I. Introduction
II. Related Work
- 1)
- Digital forensics in Data Breach Investigation: Virtual forensics has emerge as an vital approach in identifying and reading statistics breaches. according to analyze with the aid of Agarwal et al. (2011), the digital forensics procedure entails the tiers of virtual proof collection, analysis, and reporting to recognize how the assault came about. Forensic equipment consisting of FTK Imager and post-mortem were noted as key gear in safety incident investigations. This studies is relevant in providing a technical framework for this take a look at, specifically within the facts analysis method.
- 2)
- Cybersecurity Framework for E-commerce: Diverse frameworks had been proposed to improve protection on e- commerce platforms. one in every of them is the research by using Gupta et al. (2020), which makes use of the OWASP (Open Web Application Security Project) pinnacle Ten as a manual to become aware of the most commonplace web software vulnerabilities. another have a look at with the aid of Subashini and Kavitha (2011) mentioned the importance of implementing stop-to-quit encryption in ensuring customer data safety. these studies provide a strong basis in reading Tokopedia’s vulnerabilities based totally on security satisfac- tory practices.
- 3)
- Implications of Data Leaks on Consumer Confidence: Studies by using Ponemon Institute (2019) suggests that statis- tics breach incidents have a large impact on consumer accept as true with in digital platforms. A have a look at with the aid of Malhotra et al. (2004) highlights that a loss of protection for personal facts can reduce consumer loyalty and create a terrible logo picture. those insights offer essential context in comparing the social and economic effect of Tokopedia’s data breach incident.
- 4)
- Data Protection and Privacy Regulations: In conjunc- tion with the growing risk of facts breaches, records protection guidelines along with the GDPR within the ecu Union and the PDP bill in Indonesia have gained substantial attention. studies by using Kuner et al. (2012) explains how the implementation of GDPR can help lessen the hazard of facts breaches by way of placing strict protection requirements. This have a look at is relevant to explore the gaps in nearby rules and the way they affect Tokopedia’s management of private statistics.
- 5)
- Security Incident at Tokopedia: Numerous information reports and analysis propose that the Tokopedia facts leak involved tens of millions of patron records being traded at the black marketplace. research such as the one conducted via Kaspersky Lab (2020) show how e-commerce records may be a strategic target for chance actors because of the excessive fee of the information collected. This have a look at presents empirical context that supports the significance of research at the Tokopedia case.
III. Methodology
- 1)
- Literature Study
- Literature have a look at on this research turned into
- conducted to build a strong theoretical and conceptual foundation related to facts security, virtual forensics, and information leakage incidents on e-commerce structures. This method involves amassing references from various relevant literature resources, consisting of books, clin- ical publications, essays, Tokopedia reports related to information leakage, and statistics protection laws.
- a)
- Records safety and privacy safety
- The literature on information security affords im- portant insights inup to date up to date practices for protecting up to date consumer records. Books including security Engineering: A guide updated building reliable allotted structures with the aid of Ross Anderson is one of the important references for knowledge the fundamental ideas of records protection. in addition, academic journals consist- ing of IEEE Transactions on records Forensics and security provide research on facts security methods and relevant technologies.
- b)
- Digital Forensics within the Context of E-trade The look at of digital forensics is a key detail on this studies to apprehend how uncovered records can be analyzed and investigated. assets together with digital proof and computer Crime through Eoghan Casey offer a comprehensive manual to the techniques and gear utilized in forensic in- vestigations. Articles within the journal digital in- vestigation are also an vital reference for gaining knowledge of forensic techniques carried out to cyber-security incidents, specifically in the context of e-trade applications.
- c)
- Records Leak Incidents in E-commerce
- d)
- Information security law
- e)
- Tokopedia information Leak file
- f)
- Extra Reference sources
- 2)
- Case Study Analysis
- 3)
- Vulnerability Analysis
- 4)
- Vulnerability Indentification and Classification
- a
- Web Application Vulnerabilities: Such as SQL injection, cross-site scripting (XSS), and session hijacking.
- b)
- System Configuration Errors: For example, inse- cure server settings or the use of outdated encryp- tion certificates.
- c)
- Weaknesses in the Authentication Process: Such as the use of weak passwords or the absence of multi- factor authentication (MFA).
- d)
- Internal Access Exploitation: Includes unautho- rized access by internal users or lack of data access restrictions.
- e)
- Over-the-Network Attacks: Such as packet sniffing, denial-of-service (DoS) attacks, or port scanning activities.
- 5)
- Validation and Assessment of Findings
- a)
- Comparison with preceding research The findings generated in this studies are as compared with the results of other studies which have studied statistics vulnerabilities on digital systems. as an example, if weaknesses are located in facts encryption on Tokopedia, these findings could be linked to studies that have shown that TLS-based totally encryption or modern algorithms consisting of AES are more powerful than older methods. This comparison provides an empirical foundation for assessing the accuracy of the analysis carried out.
- b)
- Session with Cyber-security specialists This studies worried interviews or discussions with experts in the field of cyber-security to critically evaluate the findings. The experts furnished comments at the forensic techniques used, the validity of the assumptions, and the feasibility of the proposed recommendations. Their insights help perceive ca- pability biases within the analysis and make certain the proposed answers are realistic and applicable.
- c)
- Simulation Trial in a controlled environment some findings, particularly those associated with techni- cal trying out, are proven through simulation in a managed environment. for example, mitigation strategies which include multi-thing authentication (MFA) or intrusion detection device (IDS) im- plementation have been tested to evaluate their effectiveness in preventing assaults on customer information. those simulation consequences are in comparison with consequences said in preceding studies to make sure consistency.
- d)
- Comparative analysis with similar Incidents To increase the validity of the findings, this research additionally examined safety incidents that befell on different e-commerce platforms at domestic and abroad. with the aid of comparing the attack pat- terns, exploitation methods, and platform responses to these incidents, researchers can reinforce the analysis of vulnerabilities recognized within the Tokopedia case look at.
- e)
- Validation by means of Peer evaluate As part of the scientific validation process, the studies findings have been additionally submitted for assessment via friends or other academics with information in cyber-security. Peer evaluate enables pick out areas that require strengthening or revision, accordingly ensuring the excellent and credibility of the studies consequences.
- f)
- Trying out Relevance to local rules in addition to technical validation, the relevance of the findings to relevant statistics protection rules and guidelines in Indonesia changed into also tested. This includes analyzing the conformity of the guidelines with the non-public information safety regulation (PDP law) as well as safety requirements set by means of regulatory bodies. This validation ensures that the proposed solution is not best effective but additionally compliant with the applicable legal framework.
- A.
- Framework Analysis
- 1)
- Forensic digital security framework
- a)
- Data Collection: The first section includes the systematic acquisition of records from doubtlessly compromised structures. This consists of amassing logs, memory dumps, community traffic, and stor- age device records. using enterprise-preferred gear, consisting of FTK Imager, EnCase, and autopsy, is vital to ensure that the facts is gathered without changing its integrity. proper coping with and chain of custody protocols are vital to retaining the admissibility of proof in criminal or regulatory lawsuits. inside the context of e-commerce systems like Tokopedia, information series specializes in transaction logs, person get admission to informa- tion, and capability strains of unauthorized access.
- b)
- Records: Renovation and Integrity guarantee once information is amassed, it ought to be preserved in its authentic nation to make certain the validity of next analysis. techniques which include hashing and write-blocking are hired to prevent accidental or intentional modification. maintaining a secure repository for proof garage is also vital to shield in opposition to tampering or statistics breaches during the research system.
- c)
- Analysis: The middle of the forensic framework lies within the analysis section, wherein inves- tigators scrutinize the accrued data to discover anomalies, attack patterns, and ability weaknesses within the device. superior techniques, together with opposite engineering, timeline reconstruction, and malware evaluation, are utilized to piece col- lectively the collection of events leading to the incident. equipment like Wireshark and Splunk useful resource in reading network hobby, even as reminiscence analysis gear together with Volatility are used to discover in-reminiscence threats. For an e-trade platform, this segment may involve reading encrypted communication channels, database get admission to logs, and API usage styles to hint the source of the attack.
- d)
- Assault Direction Reconstruction: An crucial part of the evaluation process is the reconstruction of the attack route. This entails identifying how attackers gained preliminary get entry to, their lat- eral movements in the machine, and the strategies used to extract or manipulate records. expertise the assault path no longer only sheds light at the vulnerabilities exploited however also provides valuable insights into the tactics, techniques, and techniques (TTPs) hired via danger actors.
- e)
- Susceptible Point Identity: Once the assault path is understood, the framework shifts cognizance to identifying vulnerable factors in the system that facilitated the breach. those can also consist of misconfigured servers, outdated software program, or inadequate access controls. Pinpointing those vulnerabilities permits the agency to prioritize re- mediation efforts and make stronger its safety posture.
- f)
- Documentation of Digital Proof: Complete docu- mentation is critical throughout the investigation to file findings, methodologies, and conclusions. This consists of generating unique incident reports, compiling timelines of the attack, and retaining evidence in codecs acceptable for criminal court cases. right documentation ensures that the inves- tigation’s outcomes are transparent, reproducible, and defensible if challenged in a court of regulation or at some stage in regulatory scrutiny.
- g)
- Publish-Incident Evaluation and Tips The forensic virtual safety framework concludes with a post-incident evaluate. This section assesses the ef- fectiveness of the response and identifies classes learned to enhance future incident dealing with. suggestions are developed based on the research findings, specializing in mitigating identified vul- nerabilities and improving gadget defenses. these may also encompass implementing superior au- thentication methods, deploying intrusion detection systems (IDS), and adopting a zero-believe struc- ture.
- 2)
-
Main Steps The evidence collection method is a vital first step in virtual forensic investigations, particularly to recognize the resources and patterns of attacks on customers’ private records on e-commerce platforms. This degree includes collecting various applicable digital artifacts, inclusive of device logs, digital traces, and dif- ferent evidence that may be used to research the incident. With a scientific technique, this stage is designed to ensure that the proof accumulated is legitimate, true, and according with the world over identified forensic methodologies. Gadget Log series machine logs are one of the primary sources in security incident investigations. This records includes recorded activity on servers, pro- grams, and community gadgets. a number of the styles of logs accumulated include:
- a)
- Access Log: To track who accessed the system, when, and from which location.
- b)
- Error Logs: To identify system or application fail- ures that may be exploited by attackers.
- c)
- Security Log: To detect unauthorized attempts, such as failed logins or changes in access rights.
- a)
- Machine snapshot: A recording of the device’s nation at a selected time, useful for evaluating modifications over a positive duration.
- b)
- Configuration document: to check for unauthorized changes to gadget parameters.
- c)
- Memory sell off: To achieve direct facts from memory that may contain session information, cre- dentials, or traces of active assaults.
- d)
- Network conversation: statistics from network tracking gear such as Wireshark can be used to come across suspicious traffic, consisting of infor- mation being sent to unknown domains or servers.
- 3)
-
Security Technology Evaluated
- a)
- Blockchain: Blockchain is a revolutionary era that enables the advent of comfy, transparent, and im- mutable facts of transactions thru its decentralized ledger system. inside the context of e-trade, this generation gives transformative solutions to cope with essential demanding situations, specially in safeguarding sensitive consumer facts and mak- ing sure believe among stakeholders. Protecting Sensitive User Data, blockchain employs advanced cryptographic techniques to comfy information. each transaction or statistics entry is encrypted and connected to the preceding block, developing
- b)
- Encryption Techniques: This method involves en- crypting sensitive data using algorithms such as AES and RSA to prevent unauthorized access.
- c)
- Access Control Mechanism: Involves strict policies to ensure only authorized users can access sensitive data. Examples are two-factor authentication (2FA) and role-based access rights management (RBAC).
- B.
- Recomendation Development
IV. Result and Discussion
- A.
- Result
- 1)
- How the Data Leak Happened?
- 2)
- What are the possibilities?
- a)
- System Weaknesses, the programming code of any application, including Tokopedia, may have vul- nerabilities that could be exploited by malicious actors. These weaknesses can stem from various factors such as inadequate input validation, out- dated libraries, or improper error handling.
- Insufficient Input Validation, Improper validation of user input could allow attackers to execute injection attacks, such as SQL injection or cross- site scripting (XSS). For instance, attackers could exploit poorly validated user inputs to access, alter, or extract sensitive data from the. application’s database.
- Insecure Authentication Mechanisms, Weak- nesses in login systems, such as the use of predictable password reset tokens or inadequate encryption for sensitive data, can make it eas- ier for hackers to gain unauthorized access to user accounts. This could lead to data breaches affecting millions of users.
- Outdated or Vulnerable Dependencies, Modern applications often rely on third-party libraries and frameworks. If these dependencies are not updated regularly, they might contain known vulnerabilities that attackers can exploit. In the case of Tokopedia, outdated libraries may serve as entry points for attacks.
- Improper Error Handling, Applications that pro- vide detailed error messages could inadvertently reveal sensitive information about the system’s architecture or database structure. Such informa- tion is valuable to hackers when planning their attacks.
- Lack of Robust Encryption, Weak or misconfig- ured encryption algorithms used for storing sen- sitive user data, such as passwords or payment information, increase the risk of exposing this data in the event of a breach.
- b)
- Phishing Attacks
- Fake login pages,Attackers create fake Tokope- dia login pages that closely resemble the authen- tic site. Unsuspecting users may be directed to these pages via phishing emails, fake advertise- ments, or malicious links. Once users enter their credentials, the attackers capture the information for unauthorized access.
- Phishing Emails or Messages, Cyber-criminals send emails or messages pretending to be from Tokopedia, claiming account issues, security up- dates, or special offers. These communications often include a link to a fraudulent page or an attachment containing malware.
- Social Media Scams, Attackers might create fake Tokopedia support accounts or promotional pages on social media platforms, tricking users into sharing their login details or personal infor- mation through private messages or fake forms.
- Malicious Ads and Pop-ups, Users might en- counter pop-ups or advertisements claiming ur- gent action is needed for their Tokopedia ac- count. Clicking on these links redirects them to phishing sites designed to steal their information. Why Users Fall Victim to Phishing
- c)
- Brute Force Attack
- Credential Stuffing, Hackers use previously leaked username-password pairs from other plat- forms to test against Tokopedia accounts, ex- ploiting the common practice of password reuse.
- Dictionary Attacks, A list of commonly used passwords or password patterns (e.g., “123456”, “password”, or “qwerty”) is tested systemati- cally until a match is found.
- Exhaustive Search, In a more intensive ap- proach, every possible combination of characters is tested. This method is more time-consuming but can be successful if the password is short or lacks complexity. Brute force attacks are a persistent threat to e-commerce platforms like Tokopedia, but a combination of user education, strong authentication measures, and advanced security protocols can significantly reduce the risk. By staying vigilant and proactive, Tokope- dia can safeguard its users’ accounts and build a more secure platform. Mitigation Strategies:
- d)
- Steps Taken by Tokopedia
- B.
- Discussion
V. Conclusion
Acknowledgments
References
- E. Suwasono, “Consumer behavior in purchasing products online at the tokopedia marketplace,” in Prosiding Seminar, 2020, pp. 95–101.
- H. D. Oktaviani and M. R. Arafat, “Legal policy of the personal data protection bill in indonesia,” Megafury Apriandhini, SH, MH Chair of 4th OSC, p. 75, 2022.
- A. Rohendi and D. B., Kharisma. Personal data protection in fintech: A case study from indonesia. Journal of Infrastructure, Policy and Development, 2024, 8, 4158. [Google Scholar] [CrossRef]
- S. Sumartono, R. D. A. Navalino, and W. A. H. Rafsanjani. Personal data protection regulations to support investment in indonesia. Open Access Indonesia Journal of Social Sciences, 2021, 4, 243–252. [Google Scholar] [CrossRef]
- P. M. Agustini et al., “Pengaruh mobile app attractiveness, function- ality, security dan consumer fulfillment terhadap e-loyalty dengan e- satisfaction sebagai intervening pada e-commerce tokopedia,” MES Management Journal, vol. 3, no. 2, pp. 537–553, 2024.
- W. Uriawan, S. Adriansyah, S. J. Maulidiyah, S. Julianto, and W. S. Jamil, “Challenges and opportunities: improve patient data security and privacy in distributed systems,” 2024.
- W. Uriawa, S. Nurrobianti, T. M. Saif, R. I. H. Widodo, and Y. R. Asgari, “Implementing distributed system using auto promote and web services,” 2024.
- I. T. Almeyda and E., Prasetyawati. Consumer protection for the hacking of personal data of tokopedia marketplace users. Journal Evidence Of Law, 2024, 3, 206–219. [Google Scholar]
- J. R., Sumirat. Data breach in indonesia: A contemporary view. Innovative: Journal Of Social Science Research, 2023, 3, 7768–7777. [Google Scholar]
- E. Fauzy and A., Hafizhah. Legal analysis of user personal data leak cases at tokopedia. AQUACOASTMARINE: Journal of Aquatic and Fisheries Sciences, 2023, 2, 41–52. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).