{
	"id": "9680aad3-bc1a-43f8-a8c6-b6204833cf6e",
	"created_at": "2026-04-09T02:22:50.25961Z",
	"updated_at": "2026-04-10T03:36:01.407298Z",
	"deleted_at": null,
	"sha1_hash": "c613a693cbb9d62cea30329987f4f65135b8f32b",
	"title": "Hackers claim to have attacked major Bangladeshi conglomerate - DataBreaches.Net",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 393069,
	"plain_text": "Hackers claim to have attacked major Bangladeshi conglomerate -\r\nDataBreaches.Net\r\nPublished: 2021-01-19 · Archived: 2026-04-09 02:09:06 UTC\r\nHackers claim to have successfully attacked a multinational  conglomerate that is described as having the largest\r\nmarket capitalization on Bangladesh’s stock market.\r\nBeximco’s mission is “Taking Bangladesh to the World.”\r\nBackground on BEXIMCO\r\nThe Bangladesh Export Import Company Limited (“BEXIMCO”) was founded in the 1970s and has\r\napproximately 70,000 employees worldwide.  It has operations and investments across a wide range of industries\r\nincluding textiles, pharmaceuticals, PPE, ceramics, real estate development, construction, trading, marine food,\r\ninformation and communication technologies, media, Direct to Home (DTH) services, financial services, and\r\nenergy.\r\n“The Group” (as it is called) consists of four publicly traded and seventeen privately held companies. The publicly\r\ntraded companies are Bangladesh Export Import Company Limited, Beximco Pharmaceuticals Limited,\r\nShinepukur Ceramics Limited and Beximco Synthetics Limited.\r\nBEXIMCO’s newest vertical is its PPE Division. In May, 2020, BEXIMCO began shipping millions of PPE\r\ngowns, masks, and coveralls to the U.S., and its pharmaceutical division became the world’s first company to start\r\nsupplying the generic version of the antiviral medication Remdevisir for COVID-19 treatment after the drug was\r\napproved by the U.S. Food and Drug Administration for emergency use.\r\nThe total revenue of the BEXIMO group stands in excess of $1 billion USD each year. And that made it an\r\nattractive target for hackers.\r\nALTDOS Claims\r\nThis week, ALTDOS hackers contacted DataBreaches.net to report that they had hacked BEXIMCO in December,\r\nbut BEXIMCO had not responded to their demands.\r\n[Note: DataBreaches.net refers to ALTDOS in the plural because a spokesperson claims that ALTDOS has\r\nmultiple members, but DataBreaches.net really has no proof as to whether ALTDOS is one person, a few, or many.\r\nhttps://www.databreaches.net/hackers-claim-to-have-attacked-major-bangladeshi-conglomerate/\r\nPage 1 of 3\n\nPrevious coverage of ALTDOS’s claimed hacks are linked from here.]\r\n“In total, ALTDOS has stolen hundreds of gigabytes of files, source coding and databases from 34 of Beximco\r\nwebsites, including its telecom subsidiary – BOL-ONLINE.COM,”  a spokesperson wrote to DataBreaches.net.\r\nAs they have done with other hacks they have claimed, ALTDOS provided a small sample of data and screencaps\r\nas proof. Nothing in the data sample appeared super-sensitive, although one of the files contained some employee\r\nattendance information for a time period from September 24, 2018 to May 17, 2019. That file had 56,088 rows\r\neach with an employee ID number, their department, their name, and their email address. More than 23,450 of the\r\nemail addresses were from the bol-online.com domain. More than 19,000 of the email addresses were from the\r\nbeximco.net domain. Approximately 4800 were from gvtele.com. The remainder were from assorted non-corporate domains such as gmail.com, yahoo.com, and hotmail.com.\r\nDataBreaches.net sent email inquiries to a few of the email addresses in the file listed as being involved in\r\nsecurity or network. A few bounced back. Others were seemingly delivered, but DataBreaches.net received no\r\nreply. Nor did the conglomerate’s corporate media department reply to an inquiry sent 24 hours ago.\r\nALTDOS provided screencaps showing the names of folders in various directories, and the amount of data being\r\ndownloaded (or in this case, 13.6 GB compressed size for 42 compressed web site folders,  one of which is likely\r\njust a test folder).\r\nhttps://www.databreaches.net/hackers-claim-to-have-attacked-major-bangladeshi-conglomerate/\r\nPage 2 of 3\n\nAnother file called “payment_info” contained what appeared to be more than 65,000 rows with payment records,\r\nbut there was nothing in there that would be problematic in terms of bank account numbers, credit account\r\nnumbers, or parties’ names, etc.\r\nOf note, DataBreaches.net did not see any evidence that ALTDOS had obtained any corporate IP, trade secrets, or\r\nconfidential communications from any of the conglomerate’s divisions. When asked about other proof or types of\r\nfiles, an ALTDOS spokesperson said they were currently going through all the sql databases they had exfiltrated to\r\nevaluate the information they had obtained and would be providing more proof and details in the future.\r\nThis story will be updated if more information is obtained or a response is received from the conglomerate. While\r\nBangladeshi law provides for criminal consequences to hackers, if caught and convicted,  it is not clear that the\r\nconglomerate would have any breach notification obligations under Bangladeshi law if the hackers acquired\r\npersonal information of employees and/or customers. There appear to be obligations about reasonable security, but\r\nthere does not seem to be any obligation to notify employees or customers in the event of a data breach involving\r\npersonal information. A review of Bangladeshi data protection laws can be found here. If this site has mis-stated\r\nthe country’s breach notification laws, please let us know.\r\nSource: https://www.databreaches.net/hackers-claim-to-have-attacked-major-bangladeshi-conglomerate/\r\nhttps://www.databreaches.net/hackers-claim-to-have-attacked-major-bangladeshi-conglomerate/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.databreaches.net/hackers-claim-to-have-attacked-major-bangladeshi-conglomerate/"
	],
	"report_names": [
		"hackers-claim-to-have-attacked-major-bangladeshi-conglomerate"
	],
	"threat_actors": [
		{
			"id": "348b092b-f28a-41d0-a7f2-4c399f2f973f",
			"created_at": "2024-06-25T02:00:05.046536Z",
			"updated_at": "2026-04-10T02:00:03.664032Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [],
			"source_name": "MISPGALAXY:ALTDOS",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b4f79ca0-e94b-4abe-a61e-ea3d2a2458ad",
			"created_at": "2022-10-25T16:07:24.444096Z",
			"updated_at": "2026-04-10T02:00:04.994412Z",
			"deleted_at": null,
			"main_name": "ALTDOS",
			"aliases": [
				"0mid16B",
				"ALTDOS",
				"Desorden",
				"GHOSTR"
			],
			"source_name": "ETDA:ALTDOS",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775701370,
	"ts_updated_at": 1775792161,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c613a693cbb9d62cea30329987f4f65135b8f32b.pdf",
		"text": "https://archive.orkl.eu/c613a693cbb9d62cea30329987f4f65135b8f32b.txt",
		"img": "https://archive.orkl.eu/c613a693cbb9d62cea30329987f4f65135b8f32b.jpg"
	}
}