You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
BD Anonymous Team

BD Anonymous Team

ID: 9f9ab2a2d4c5a8002326eac8fb84a615
Hacktivist Group Hacktivism
Threat types: Hacktivism, Defacement, Intrusion, DDoS Attack
Bangladesh DNK, GRL, ISR, ITA, ROU, ARE, GBR
Updated: 2026-04-12
Created: 2026-01-20
Progress: 92% Completeness: 88% Freshness: 100%
Operation zone: Denmark, Greenland, Israel, Italy, Romania, United Arab Emirates, United Kingdom
Aliases Limited alias preview
BangladeshAnonymous BangladeshAnonymousTeam BD********** BD*********************
BD*************** BD********* BD************* Th**************
Showing 2 of 8 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

BD Anonymous is a Bangladesh-associated hacktivist brand active in Telegram-centric campaign ecosystems (e.g., OpIsrael and other themed ops). OSINT links the actor to claimed/reported DDoS/DoS activity and, in ecosystem mappings, to data collection/doxxing themes targeting Israeli entities. Activity is often claim-led and should be validated with telemetry.


Technique Technique name Tactics Evidence
T1585 Establish Accounts TA0042
  • 2025-09-18 — Telegram claim activity and domain-list posting described as major behavior pattern for BD Anonymous in campaign ecosystems. · ref
  • 2026-03-02/05 — Alliance signaling and narrative-driven coordination described in escalation reporting that includes BD Anonymous activity. · ref
T1498 Network Denial of Service TA0040
  • 2026-03-02/05 — BD Anonymous Team cited as targeting Qatar MOI online services with DDoS activity in escalation reporting. · ref
  • 2026-02-25 — BD Anonymous cited as targeting JCCI during #OpJapan claim cycle. · ref
T1595 Active Scanning TA0043
  • 2025-09-18 — INFERENCE (confidence: medium): target selection and validation of exposed public services implied by repeated domain-list posting and accessibility proof behavior. · ref
T1567.002 Exfiltration to Cloud Storage TA0010
  • 2025-06-18 — INFERENCE (confidence: medium): ecosystem mapping associates BD Anonymous with doxxing/data collection themes; disclosure may occur via public platforms (mechanism varies). · ref
Strategic Intelligence
Limited preview
Last updated: 2026-04-03T15:49:28+00:00

BD Anonymous — Hacktivist brand (disruption + influence; doxxing/data-collection cited in ecosystem reporting)

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — BD Anonymous

Classification: Unclassified / OSINT — TLP:WHITE

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — BD Anonymous

Goal: detect DDoS/DoS waves, quantify real impact, and catch opportunistic compromise attempts that may occur during disruption “noise.”

Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-03-05T21:01:08+00:00

IOC Appendix — BD Anonymous

Classification: Unclassified / OSINT — TLP:WHITE

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-03-05T21:01:34+00:00

OSINT Library — BD Anonymous


2026-03-02/05 — CloudSEK — “Situation Report: Middle East Escalation (February 27–1st March, 2026)”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/6

Address Verification SOCMINT
t.me/Ban****************** Restricted Not integrated
t.me/Ban******************** Restricted Not integrated
t.me/ban***************** Restricted Not integrated
t.me/htt********************* Restricted Not integrated
t.me/Ban******************** Restricted Not integrated
t.me/Ban****************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–12 of 15 images
Alliance with Nation Of Saviors Free Preview
Alliance with Nation Of Saviors
Alliance with Tunisian Maskers Cyber Force Free Preview
Alliance with Tunisian Maskers Cyber Force
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Alliance with Wolves of Turan Free Preview
Alliance with Wolves of Turan
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Alliance with BadakSecTeam Free Preview
Alliance with BadakSecTeam
Propaganda - Logo Free Preview
Propaganda - Logo
Showing 4 of 15 images in preview mode. Additional evidence is restricted for Analyst and Premium plans.