Thursday, April 10, 2025
HomeCyber Security NewsMysterious Team Bangladesh Hackers Launched 750 DDoS Attacks and Hacked 78 Website

Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks and Hacked 78 Website

Published on

SIEM as a Service

Follow Us on Google News

The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress.

It conducts DDoS and defacement attacks through open-source utilities and is believed to have carried out over 750 DDoS and 70+ website defacements within a year.

The group has been active since 2020 and targets logistics, government, and financial sector organizations in India and Israel.

- Advertisement - Google News

The Group-IB Threat Intelligence shared the latest report on Mysterious Team Bangladesh activities.

Detailed analysis:

According to the report, India was the most targeted nation, and the group launched a large-scale campaign against India in May 2023.

It is suspected that the group will expand its operation across Europe and Asia Pacific and the middle east at the end of 2023.

The most common technique utilized by the group to target the victim is DDOS and defacement attacks.

In addition to that, it exploits widely deployed and outdated services, such as PHPMyAdmin and WordPress.

A D4RK TSN threat actor is believed to be behind this group, and multiple active social media pages such as Facebook, Twitter, and Telegram were identified.

The group posted its past and upcoming attacks on their telegram channel which has been active since 2022.

A prime example of a group driven by religious motives is a recent campaign targeting multiple organizations in Sweden, triggered by the incident involving the burning of the Quran.

The percentage of attacks launched by the group is as follows: 88% were DDos,9% were defacement and 2.9% attacks were launched against databases.

In some cases, the group exfiltrated data from the organization and posted it on their Telegram channel.

They have the capability to launch attacks against a large number of targets quickly and assume that it has scripts for the mass exploitation of websites using the same frameworks or server software versions.

Keep yourself informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...