Desyanti Suka Asih K.Tus


Data is an important part of the need in today's Information Technology era. The data of every human individual in the world has a high level of sensitivity for anyone. Data that is currently developing both offline and online data, requires a certain level of security in its access. Good data security techniques are needed in ensuring the confidentiality of a data including from attacks of several types of malware viruses and ransomware.

Types of malware viruses and ransomware work with the concept of damaging, stealing and locking data with various purposes, one of which is to make a profit. Ransomware works by locking certain files that are targeted and encrypted so that the data is inaccessible. In the end, if you want to access the stored data, users are required to contact the contact of the creator of the ransoware by paying a certain amount of money in decrypting the locked data. Ransomware can be categorized as cyber extortion. Article 27 paragraph 4 of the ITE Law provides arrangements on the dissemination of information that has extortion content whose provisions are regulated in the Criminal Code. Ransomware meets the elements of the criminal act of extortion as stipulated in the provisions of Article 368 paragraph (1) of the Criminal Code. The perpetrator commits extortion coupled with acidification by closing the victim's access to his data. The government has made legal protection efforts for victims of ransomware among others through the arrangements contained in Article 27 Paragraph (4) of the ITE Law. As well as the application of criminal sanctions of confinement and fines for perpetrators of ransomware crimes. Protection of cyber space users can also be done by individuals (individuals) by building regulations in cyberspace and being vigilant in using the internet. In an effort to provide legal protection for ransomware victims, cooperation is needed between the government as a lawmaker and users (victims of ransomware) cyber space. More advanced and unconventional regulations are critical in dealing with cybercrime. Because all forms of cybercrime cannot be touched by the rule of law.


Keywords: Legal Protection, Victims, Ransomware

Teks Lengkap:



Akbanoy, M. (2019). WannaCry Ransomware: Analysis of Infection, Persistance, Recovery Prevention and Propagation Mechanisms. Journal of Telecommunications and Information Technology, Vol.1, 15.

Arief, B. N. (2006). Tindak PIdana Mayantara: Perkembangan Kajian Cybercrime di Indonesia. Jakarta: PT. Grafindo Persada.

Everett, C. (2016). Ransomware: To pay or not to pay? Copm. Fraud & Secure, Vol.4, 8-12.

Kusumawardani, Q. D. (2019, Maret). Perlindungan Hukum Bagi Pengguna Internet Terhadap Konten Web Umpan Klik Di media Online. Jurnal Penelitian Hukum DE JURE, Vol.19(No.1), 18.

Ramopolii, C. B. (2014, Mei-Juli). Wewenang Khusus Penyidik Untuk Melakukan Penyidikan Tindak Pidana Teknologi Informasi. Lex Crimen, Vo.III(No.3), 6.

Soesilo, R. (1988). Kitab Undang-Undang Hukum Pidana (KUHP) Serta Komentar-Komentarnya Lengkap Pasal Demi Pasal. Bogor: Politeia.

Suhariyanto, B. (2013). Tindak Pidana Teknologi Informasi (Cybercrime) Urgensi Pengaturan dan Celah Hukumnya. Jakarta: PT. Raja Grafindo Persada.

Talinusa, S. C. (2015, Agustus). Tindak Pidana Pemerasan Dan/Atau Pengancaman Melalui Sarana Internet Menurut Undang-Undang Nomor 11 Tahun 2008. Lex Crimen, Vol.IV(No.6), 162.

Tanthawi, e. a. (2014). Perlindungan Korban Tindak Pidana CyberCrime Dalam Sistem Hukum Pidana Indonesia. Jurnal Ilmu Hukum Pascasarjana Universitas Syiah Kuala, Vol.2(No.1), 38.

Kitab Undang-Undang Hukum Pidana

Undang-Undang Republik Indonesia Nomor 11 tahun 2008 Tentang Informasi dan Transaksi Elektronik (Lembaran Negara Republik Indonesia Tahun 2008 Nomor 58, Tambahan Lembaran Negara Republik Indonesia Nomor 4843).

Undang-Undang Republik Indonesia Nomor 19 Tahun 2016 Tentang Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik (Lembaran Negara Republik Indonesia Tahun 2016 Nomor 251, Tambahan Lembaran Negara Republik Indonesia Nomor 5952).

Alamsyah, E. S. (2018, Juni Jumat). Republika. Retrieved Desember Jumat, 2019, from

Makarim, E. (2003). Kompilasi Hukum Telematika. Jakarta: PT. Raja Grafindo.

Maskun. (2013). Kejahatan CYber Crime Suatu Pengantar. Jakarta: Kencana.

Putra, N. N. (2017, Mei Senin). Hukum Online. Retrieved Desember Jumat, 2019, from

Roy. (2019, Agustus Senin). CNBC Indonesia. Retrieved Desember Jumat, 2019, from CNBD Indonesia:

Ulun, M. (2019, Oktober Jumat). kabar24. Retrieved Desember Jumat, 2019, from

Wibowo, S. (2019, Desember Rabu). CNN Indonesia. Retrieved Desember Jumat, 2019, from



  • Saat ini tidak ada refbacks.

width="135" width="135"    

View My Stats