Police Uncover Fake E-Ticket Scam Disguised as Official Attorney General's Website
The Indonesian National Police’s Criminal Investigation Unit (Bareskrim) has uncovered a syndicate involved in online fraud, using SMS blasts to distribute fake e-ticket payment links that mimic the Attorney General’s Office website. The Head of the Cyber Directorate of Bareskrim Polri, Brigadier General Himawan Bayu Aji, stated that the case originated from a public complaint filed on December 9, 2025, with reference number B-693/E.1/EE.3/12/2025.
“The report revealed the circulation of 11 phishing links that resembled the official website for e-ticket payments belonging to the Attorney General’s Office, with the original URL being https://tilang.kejaksaan.go.id,” Himawan said during a press conference on Wednesday, February 25, 2026.
The perpetrators spread the fake links through SMS blasts from five mobile phone numbers to the public. These five numbers then expanded to several other mobile phone numbers.
The incident began when victims received SMS messages from unknown numbers, informing them of outstanding traffic violation fines and including a link. “The victims then clicked on the link and were directed to a fake e-ticket website that closely resembled the official Attorney General’s website,” Himawan explained.
Believing the website to be genuine, the victims entered their personal data and credit card information, leading to unauthorized debit transactions on their credit cards amounting to 2,000 Saudi Riyals, equivalent to Rp 8,800,000.
In response, the police conducted an investigation and discovered 124 other phishing website links. Additionally, the police identified six additional mobile phone numbers used by the perpetrators to distribute the SMS blasts.
Previously reported, the five suspects are WTP (29), FN (41), RW (40), BAP (38), and RJ (29). The suspects in Indonesia are accomplices who receive and carry out instructions from Chinese nationals using Telegram accounts.
Here are the roles of the five suspects in Indonesia:
WTP, acted as the main perpetrator who operated the devices and conducted SMS blasts since September 2025.
FN, provided SMS blast services to foreign clients and managed SIM cards since July 2025.
RW, assisted in the operational SMS blasting with suspect FN since July 2025.
BAP, acted as the main perpetrator of SMS blasting and operated the blasting devices since February 2025.
RJ, acted as the provider or seller of registered SIM cards to other perpetrators.