Threat Actor Characterization
Team 1916
ID: 171ed8bebe36973a9980d10e08b6ff5023735| Team1916 | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Team 1916 is a hacktivist brand referenced in OSINT within pro‑Palestinian collaboration ecosystems and linked to disruption activity (DDoS) and Telegram-amplified claim/advertisement behavior (including reported data-sale promotion). Evidence supports a disruption-first posture; deep intrusion or data theft claims should be treated as unproven without telemetry. Techniques beyond DDoS and propaganda are marked as INFERENCE where not directly evidenced.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 | |
| T1585.001 | Social Media Accounts | TA0042 |
|
| T1595 | Active Scanning | TA0043 |
|
Team 1916 — Pro‑Palestinian‑Aligned Hacktivist Brand (DDoS + Claims Ecosystem)
Classification: TLP: WHITE — Open Source Intelligence (OSINT)
Category: Cyber / Hacktivism — Disruption (DDoS) + Influence/claims
Assessed home base: Unclear; some reporting describes Afghanistan-linked identity claims (treat as unverified)
Executive Summary
Team 1916 is assessed as a hacktivist brand that appears in pro‑Palestinian hacktivist collaboration ecosystems and is referenced in open reporting for disruption activity and public claim amplification. The strongest recurring operational posture described in sources is DDoS disruption against high‑visibility targets, paired with Telegram‑style messaging and opportunistic participation in coalition dynamics.
Open reporting describes a DDoS operation attributed to TEAM1916 against a Dubai government website in May 2024. Separate reporting indicates Team 1916 advertised a sensitive database for sale on Telegram in April 2024 (advertisement behavior), which suggests the brand also participates in a claims marketplace and influence ecosystem.
Confidence is medium–high that Team 1916 is a real brand used within hacktivist claim ecosystems and referenced by multiple independent sources. Confidence is medium that the brand is consistently operationally active over time; some ecosystem reporting suggests the group may have periods of inactivity or churn. Confidence is low–medium for deep intrusion capability beyond disruption and advertising claims, because technical artifacts and victim‑side validation are not consistently available in open sources.