You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
TEAM BD CYBER NINJA

TEAM BD CYBER NINJA

ID: 7d5f3563d7e07144ed31dd017b11454c
Hacktivist Group Hacktivism
Threat types: Hacktivism, Black-Hat, Defacement, Data Leak, Propaganda
Bangladesh BGD, BRA, IND
Updated: 2026-04-12
Created: 2026-01-27
Progress: 95% Completeness: 100% Freshness: 100%
Operation zone: Bangladesh, Brazil, India
Aliases Limited alias preview
Bangladesh Black-Hat Cyber Team TBCN TB****************************** Te*****************
Te****************
Showing 2 of 5 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Bangladesh-linked hacktivist collective associated in OSINT with website defacement campaigns and public claims, primarily targeting Bangladesh and India; occasional extortion/ransomware claims exist but are inconsistently corroborated.


Technique Technique name Tactics Evidence
T1595 Active Scanning TA0043
  • 2024-12-03 — INFERENCE (confidence: medium): Opportunistic defacement groups typically identify weak web targets via broad discovery/scanning prior to exploitation. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2025-11-25 — OSINT describes TBCN conducting cyber defacement against education and government institutions, consistent with exploitation of public-facing web applications/CMS. · ref
T1110 Brute Force TA0006
  • 2024-12-03 — INFERENCE (confidence: low): Some defacement activity in similar ecosystems leverages weak credentials/brute force against admin panels; not directly evidenced for TBCN in cited sources. · ref
T1491.002 External Defacement TA0040
  • 2025-11-25 — Cyble notes TBCN focuses on cyber defacement campaigns, mapping to External Defacement. · ref
T1567.002 Exfiltration to Cloud Storage TA0010
  • 2024-12-03 — INFERENCE (confidence: low): Leak-claim behavior often involves posting stolen data to online services; specific exfil destinations are not detailed for TBCN in cited sources. · ref
T1486 Data Encrypted for Impact TA0040
  • 2025-10-31 — Cyble reports TBCN 'Black Hat' division claimed a ransomware capability; claims remain unverified (treat as aspirational). · ref
  • 2026-02-18 — A defaced victim page claims files were locked/encrypted and demands payment; this is case-specific and may not represent a stable actor capability. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-02-18T19:54:41+00:00

TEAM BD CYBER NINJA

— Bangladesh-linked hacktivist / defacement collective (OSINT-visible)

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — TEAM BD CYBER NINJA

Classification: Unclassified / OSINT — TLP:WHITE

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — TEAM BD CYBER NINJA

Priority: High for organizations with public-facing web portals (education, government, local services) in South Asia; Medium elsewhere. This playbook focuses on detecting opportunistic web compromise leading to external defacement and related coercion signals attributed to TEAM BD CYBER NINJA-style activity.

Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-18T19:57:08+00:00

IOC Appendix — TEAM BD CYBER NINJA

Classification: Unclassified / OSINT — TLP:WHITE

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-18T19:57:20+00:00

OSINT Library — TEAM BD CYBER NINJA


2025-11-25 — Cyble — “Threat actor profiles: Team BD Cyber Ninja (Bangladesh-based defacement targeting BD/India)”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/15

Address Verification SOCMINT
twitter.com/x.c****************** Restricted Not integrated
Address Verification SOCMINT
www.facebook.com/gro*********** Restricted Not integrated
facebook.com/fac********************* Restricted Not integrated
facebook.com/fac************************ Restricted Not integrated
Address Verification SOCMINT
t.me/tea***************** Restricted Not integrated
t.me/+Fx************** Restricted Not integrated
t.me/+VU************** Restricted Not integrated
t.me/t.m*********************** Restricted Not integrated
t.me/t.m********************** Restricted Not integrated
Address Verification SOCMINT
dis****************** Restricted Not integrated
www.youtube.com/@te********************** Restricted Not integrated
Address Verification SOCMINT
te*****************@protonmail.com Restricted Not integrated
te**********************@protonmail.com Restricted Not integrated
Address Verification SOCMINT
fundicionhunter.com Restricted Not integrated
Address Verification SOCMINT
github.com/git*************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–3 of 3 images
Logo Free Preview
Logo
Propaganda Free Preview
Propaganda
Hacked website Free Preview
Hacked website