Bangladesh Cyber Threat Landscape Report 2021

Published on 30-Dec-2021 00:00:00

With the advent of COVID‐19 the whole world is grappling to sustain their economy. Bangladesh is no exception to tackle the challenges to keep the work force moving with the adaption of ‘work from home’ or ‘online’ education. As the internet usage grew exponentially due to intermittent ‘lockdown’, cyber threat landscape also evolved. Cybercriminals have shown no sign of slowing down in 2021 and, as we approach the halfway point and the gradual climb out of the COVID‐19 pandemic, they are still not short of sophisticated and malicious ways to achieve their goals. Phishing attempts, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, Ransomware and access brokers, Business email compromise (BEC), Data breaches, Supply chain attacks, Crypto jacking were among the top threats reported globally.


BGD e‐GOV CIRT publishes “Bangladesh Cyber Threat Landscape” report by collecting information from Critical Information Infrastructures, information available from open sources and BGD e‐GOV CIRT’s own Cyber Threat Intelligence (CTI) capabilities. It's really necessary for nationwide cybersecurity to recognise evolving developments in cyber challenges and to recognize the future of cyber‐attacks and allow successful responses to cybersecurity threats. Every year international organizations like ENISA as well as Industry Service Providers publish lots of Threat Landscape reports. However, each nation has its own eccentricities, and in order to develop the requisite cyber capabilities and successfully minimize cyber threats, it is important to recognize the national cyber threat landscape based on local set of data. That’s where this effort comes into place. The national cyber threat landscape study of Bangladesh describes Bangladesh's top cyber threats, their interactions with threat agents, specific threat mechanisms used to initiate a particular threat and kill chain for it. Each incident category used by us is allocated to each cyberthreat.

Download the full Document