Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
PELICAN HACKERS
ID: f8f59714e9d00d6a36bfb31fb0bfdc97
Cybercrime
Cybercriminal
Hacktivist
Threat types: Hacktivism, Politically-motivated intrusion
Progress: 76%
Completeness: 78%
Freshness: 70%
Operation zone: Pakistan
Aliases
Limited alias preview
| Team Pelican Hackers | TPH | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
PELICAN HACKERS (aka Team Pelican Hackers) is an OSINT-observed hacktivist label linked in 2025 reporting to claimed intrusions and alleged data exposure targeting Pakistani institutions. Technical details are limited; mapping focuses on high-level behaviors and marks inferred items explicitly.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1565.002 | Transmitted Data Manipulation | TA0040 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1110 | Brute Force | TA0006 |
|
Executive brief
now
Saved successfully.
Hunting Playbook — PELICAN HACKERS
Priority: Medium. Context: claim-driven hacktivist activity and opportunistic intrusion patterns in South Asia; limited actor-specific IOCs available, so hunts focus on common web/IAM/data-exfil primitives.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.