You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Xebat

Xebat

ID: 4bffe8e0d097c319ba2fcfc3396cd56c25034
Hacktivist Group Defacement Crew Hacktivism
Threat types: Defacement
Turkey TUR
Updated: 2026-04-21
Created: 2025-10-14
Progress: 66% Completeness: 52% Freshness: 100%
Operation zone: Turkey
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Xebat — Alleged member/affiliate of RedHack. Due to insufficient public artifacts tying the handle to distinct operations, this entry inherits the group's activity footprint (defacements, leaks, DDoS) as indirect complicity.


Technique Technique name Tactics Evidence
T1491.002 External Defacement TA0040
  • 2012-02-28 — INFERENCE: indirect complicity via RedHack membership/affiliation; group defaced/altered police-facing resources and published content after the Ankara Police/POLNET incident. · ref
  • 2015-03-12 — INFERENCE: indirect complicity; RedHack defacement of the Istanbul Police Association site with a tribute message. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2013-06-28 — INFERENCE: indirect complicity; SecurityWeek reports authentication flaws and access to the Istanbul Special Provincial Administration portal (public-facing app exploitation). · ref
  • 2014-01-11 — INFERENCE: indirect complicity; XSS exploited on the Parliament/TBMM site to inject messages; additional compromises the same day. · ref
T1565.001 Stored Data Manipulation TA0040
  • 2013-07-01 — INFERENCE: indirect complicity; debt write-off/forgiveness in Istanbul administration portals after intrusion (stored data manipulation). · ref
  • 2014-11-16 — INFERENCE: indirect complicity; reported bill cancellations in the Soma electricity distribution system following access. · ref
T1498 Network Denial of Service TA0040
  • 2012-04-27 — INFERENCE: indirect complicity; regulator acknowledged a DDoS that slowed TTNet (impact disputed). · ref
T1078 Valid Accounts TA0001 TA0003 TA0004 TA0005
  • 2016-12-07 — INFERENCE: indirect complicity; RedHack-attributed access to Energy Minister Berat Albayrak’s email accounts prior to mass publication. · ref
  • 2016-12-07 — INFERENCE: indirect complicity; civil-society reporting summarizes the large email trove and subsequent mirroring/blocks. · ref
T1041 Exfiltration Over C2 Channel TA0010
  • 2016-12-06 — INFERENCE: indirect complicity; publication/mirroring of large volumes of emails/documents following mailbox access. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-14T21:10:54+00:00
Xebat — Alleged RedHack Member

CLASSIFICATION: Unclassified / Open Source

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/0

No social links registered for this profile.
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.