You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
MaNYaK

MaNYaK

ID: b3d6b0eef5ace0d106ab10142d55554133399
Hacktivist Group Defacement Crew Hacktivism
Threat types: Defacement
Armenia TUR
Updated: 2026-04-21
Created: 2025-10-14
Progress: 75% Completeness: 64% Freshness: 100%
Operation zone: Turkey
Aliases Limited alias preview
ManNYaK
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

MaNYaK — Handle referenced in Turkish media and court reporting (2013) as an alleged RedHack member/leader; identified by prosecutors as Taylan Kulaçoğlu, who was detained and re-detained in late November 2013 and then released on December 12, 2013 due to lack of evidence. Open sources describe the cyber police’s identification method (MIRC-based anecdotal matching) and place these events within ongoing cases against suspected RedHack affiliates. Linkage between the handle and specific RedHack technical operations is not established in public evidence.


Technique Technique name Tactics Evidence
T1491.002 External Defacement TA0040
  • 2012-11-27 — Context: RedHack defendants tried in Ankara (terror-related charges) following 2012 police website compromise and public-facing impact actions. · ref
T1041 Exfiltration Over C2 Channel TA0010
  • 2012-11-27 — Context: Proceedings referenced prior RedHack data exposure/‘PoliceLeak’ narratives from 2012 incidents (exfiltration followed by publication). · ref
T1589 Gather Victim Identity Information TA0043
  • 2013-11-29 — Investigative method claimed by cyber police to identify 'Manyak' via MIRC chatter + biographical filters (non-technical personal-data triage). · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-14T18:21:45+00:00
MaNYaK — Alleged RedHack Member

CLASSIFICATION: Unclassified / Open Source


Executive Summary

MaNYaK” appears in late-2013 Turkish media and prosecutorial narratives as an alleged member/leader of the hacktivist collective RedHack. Prosecutors identified the suspect as Taylan Kulaçoğlu, who was detained on 29 November 2013, briefly released, then re-detained the same day on a prosecutorial objection, and ultimately released for lack of evidence on 12 December 2013. Reporting describes the cyber-police’s non-technical identification method—combining MIRC chat clues with biographical filters to shortlist hundreds of names—rather than a forensic linkage between the alias and specific intrusions. Open sources do not establish that “MaNYaK” conducted concrete RedHack operations; the public record is primarily procedural (detention, allegation, release). Given the overlap with broader cases against suspected RedHack affiliates (especially post-2012 incidents) but the absence of technical proof, overall confidence is medium.

  • 2012-11-27. Context: criminal proceedings in Ankara against alleged RedHack affiliates following 2012 police-system compromises and disclosures.
  • 2013-11-26. Nationwide RedHack probe: raids and 14 detentions reported; several released after initial questioning.
  • 2013-11-29. Detention of Taylan Kulaçoğlu in Istanbul, transferred to Ankara; prosecution alleges he is “MaNYaK,” purported RedHack leader; both RedHack and defense deny.
  • 2013-11-29. Cyber-police identification method reported: MIRC chatter plus biographical filters (e.g., “lost his grandfather,” “issues with military service”) to narrow ~600 candidates and select the “most geeky.”
  • 2013-12-12. Released for lack of evidence: the suspect linked to the “MaNYaK” alias freed by court decision.


Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/1

Address Verification SOCMINT
x.com/man************ Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–3 of 3 images
Twitter account evidence Free Preview
Twitter account evidence
Avatar used on Twitter account Free Preview
Avatar used on Twitter account
Banner used on Twitter account Free Preview
Banner used on Twitter account