You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Partizan

Partizan

ID: 2d2ee7a60afeb7589b5beeace4ffa32c93539
Hacktivist Group Defacement Crew
Threat types: Defacement
Turkey TUR
Updated: 2026-01-13
Created: 2025-10-14
Progress: 51% Completeness: 52% Freshness: 50%
Operation zone: Turkey
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Partizan — Alleged member/affiliate of RedHack. Due to insufficient public artifacts tying the handle to distinct operations, this entry inherits the group's activity footprint (defacements, leaks, DDoS) as indirect complicity. The alias appears on a 2006 RedHack defacement banner preserved on kevinworthington.com.


Technique Technique name Tactics Evidence
T1491.002 External Defacement TA0040
  • 2006-08-04 — INFERENCE: indirect complicity via RedHack membership/affiliation; alias 'Partizan' listed on a RedHack defacement banner (external defacement). · ref
  • 2012-02-28 — INFERENCE: indirect complicity; RedHack compromise of Ankara Police/POLNET followed by public posting. · ref
  • 2015-03-12 — INFERENCE: indirect complicity; RedHack defaced the Istanbul Police Association website with a tribute message. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2013-06-28 — INFERENCE: indirect complicity; exploitation/authentication weaknesses reported at the Istanbul Special Provincial Administration portal (public-facing app). · ref
  • 2014-01-11 — INFERENCE: indirect complicity; XSS on the Parliament/TBMM site to inject messages; additional same-day compromises. · ref
T1565.001 Stored Data Manipulation TA0040
  • 2013-07-01 — INFERENCE: indirect complicity; debt write-offs/forgiveness in Istanbul administration portals after intrusion (stored data manipulation). · ref
  • 2014-11-16 — INFERENCE: indirect complicity; reported bill cancellations in the Soma electricity distribution system following access. · ref
T1498 Network Denial of Service TA0040
  • 2012-04-27 — INFERENCE: indirect complicity; regulator acknowledged a DDoS that slowed TTNet (impact disputed). · ref
T1078 Valid Accounts TA0001 TA0003 TA0004 TA0005
  • 2016-12-07 — INFERENCE: indirect complicity; RedHack-attributed access to Energy Minister Berat Albayrak’s email accounts prior to mass publication. · ref
  • 2016-12-07 — INFERENCE: indirect complicity; civil-society reporting summarizes the large email trove and subsequent mirroring/blocks. · ref
T1041 Exfiltration Over C2 Channel TA0010
  • 2016-12-06 — INFERENCE: indirect complicity; publication/mirroring of large volumes of emails and documents following mailbox access. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-14T22:07:08+00:00

Partizan — Alleged RedHack Member

CLASSIFICATION: Unclassified / Open Source

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/0

No social links registered for this profile.
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.