You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Bahrain Cyber Army

Bahrain Cyber Army

ID: dea35a5c035ad41f297878f931f57e78
Hacktivist Group Hacktivism
Threat types: Hacktivism, Intrusion, Defacement
Bahrain
Updated: 2026-04-12
Created: 2026-04-03
Progress: 83% Completeness: 76% Freshness: 100%
Operation zone:
Aliases Limited alias preview
Bahrain Cyber BahrainCyber Ba**************
Showing 2 of 3 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Bahrain Cyber Army is a historically documented, opposition-aligned hacktivist identity linked to politically framed attacks on Bahraini government websites. Public reporting supports website defacement and symbolic disruption, but not a mature long-term intrusion program.


Technique Technique name Tactics Evidence
T1491.001 Internal Defacement TA0040
  • 2018-01-01 — Public reporting links Bahrain Cyber Army to attacks on government websites that included politically framed message placement. This most directly maps to website defacement. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2018-01-01 — INFERENCE (confidence: medium): compromise of public government websites for visible defacement most plausibly involved exploitation of exposed public-facing applications or associated administrative weaknesses. · ref
T1595 Active Scanning TA0043
  • 2018-01-01 — INFERENCE (confidence: low): some level of target enumeration or active discovery was likely required to identify symbolic government web assets suitable for compromise. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-04-12T19:33:33+00:00
Bahrain Cyber Army

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Category: Opposition-Aligned Hacktivist / Defacement-Oriented Cluster

Assessed Origin: Bahrain-linked opposition milieu (confidence: medium)


Executive Summary

Bahrain Cyber Army is best assessed as an opposition-aligned hacktivist identity that surfaced publicly in connection with website defacements and disruptive messaging against Bahraini government-linked targets. The public evidence base is limited and uneven, but open reporting indicates that a group using this name claimed responsibility for a series of attacks on government websites in 2018 and used defacement messages demanding the release of political prisoners and an end to human-rights abuses. The actor therefore appears more consistent with politically motivated symbolic disruption than with covert espionage, long-term access operations, or financially motivated cybercrime.


The most defensible analytical posture is conservative. Bahrain Cyber Army has enough public footprint to justify a dossier, but the available evidence does not support high-confidence claims about membership, organizational depth, infrastructure maturity, or continuity of operations beyond a narrow historical window. Unlike Bahrain-linked government surveillance clusters such as PEARL or LULU, Bahrain Cyber Army appears closer to a protest-oriented digital pressure identity operating in a highly repressive information environment.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — Bahrain Cyber Army

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Bahrain Cyber Army

Scope. This playbook is designed for public-sector web defense, website integrity monitoring, and detection of politically motivated website compromise consistent with the limited public record associated with Bahrain Cyber Army. Because the actor’s open-source footprint is sparse, the hunts focus on defensible behaviors rather than speculative tooling.

Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-04-12T19:35:08+00:00

IOC Appendix — Bahrain Cyber Army (TLP:WHITE)

Scope & Caveats. Bahrain Cyber Army has a sparse public footprint and is primarily associated with politically framed website compromise rather than richly documented malware operations. As a result, there are no strong public hard IOCs such as verified sample hashes, stable domains, or known wallets tied to the actor. This appendix therefore prioritizes behavioral indicators, web-compromise patterns, and a small set of practical pseudo-IOCs for hunting and integrity monitoring.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-04-12T19:35:20+00:00

OSINT Library — Bahrain Cyber Army


2024-01-13 — The Hacker Wire — “Hackers Attack Bahrain's International Airport Website”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/1

Address Verification SOCMINT
www.youtube.com/@ba************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–1 of 1 images
Logo / Avatar Free Preview
Logo / Avatar