About Us

Bangladesh Government’s e-Government Computer Incident Response Team (BGD e-GOV CIRT), Bangladesh Computer Council (BCC) serving as the National CERT of Bangladesh (N-CERT) with responsibilities including but not limited to receiving, reviewing, and responding to computer security incidents and activities in the territory of Bangladesh as well as keeping close collaboration with international partners to secure the cyberspace of Bangladesh. BGD e-GOV CIRT reviews and takes necessary measures to resolve the issues with broad cybersecurity ramifications, conducts research & development, and provides guidance on security threats & vulnerabilities. BGD e-GOV CIRT also works with various Government Agencies, Critical Information Infrastructures (CII), Financial Organizations, Law Enforcement Agencies (LEAs), Academia & Civil Societies to help improve the cybersecurity landscape of Bangladesh. BGD e-GOV CIRT has a very strong tie with international organizations and cybersecurity communities and works as a focal point for Bangladesh for trans-border cyber issues.

BGD e-GOV CIRT has a service catalog of its own which lists all the services provided by the team on a payment basis.

Sheikh Hasina

Honourable Prime Minister

Sajeeb Wazed Joy

Adviser to Hon’ble PM for ICT Affairs

Zunaid Ahmed Palak

Hon’ble State Minister

Md. Shamsul Arefin

Secretary

Ranajit Kumar

Executive Director

Engr. Mohammad Saiful Alam Khan

Project Director

Our Services

Incident Handling

The incident handling unit provides Penetration Test, Vulnerability Assessment, Incident Analysis, Security Threat Notification, and Incident Coordination service.

Digital Forensic

Helps the incident handling unit as a reactive service after an incident occurs by providing forensic support on evidence.

Cyber Gym

Cyber Gym is essential for organizing training and build awareness on Cyber Security. It helps organizations to mitigate future cyber risks and challenges.

Threat Intelligence

Threat intelligence helps enhance your threat landscape visibility, providing context for trends to monitor, how threat actors behave, and where you may be most vulnerable for an attack.

IT Audit

An IT audit is the examination and evaluation of an organization’s information technology infrastructure, policies and operations.

Cyber Sensor

“Identify Cyber security threats” inside the organization.  Monitor the IP network activity, finding unwanted traffic in network, suspicious related executable downloads into the network.

Risk Assessment

The Cyber Risk Assessment is an essential preventive measure that effectively mitigates the possibility of the organization’s future cyber risks and challenges.

Awareness Building

The aim of cyber security awareness program is to spread awareness of the different kinds of cyber threats and to focus attention on security making the average user sensitive to different threats.

News/Security Update
Cyber Threat Alert: Surge in Attacks via Compromised Third-Party Service Providers
Articles, English articles, Security Advisories & Alerts

Cyber Threat Alert: Surge in Attacks via Compromised Third-Party Service Providers

The Cyber Threat Intelligence Unit at BGD e-GOV CIRT has identified a surge in cyber-attacks targeting organizations through the compromise of third-party service providers. Recently, multiple organizations in Bangladesh have encountered data breaches. Some individuals employed by third-party service providers, tasked with offering technical support to various client organizations, have been targeted by information-stealing malware. Investigations revealed that the information-stealing malware covertly extracted sensitive data,...

Read More

0 / / Feb 08, 2024
Cyber Threat Alert: Surge in Attacks via Compromised Third-Party Service Providers
Articles, English articles, Security Advisories & Alerts

Cyber Threat Alert: Surge in Attacks via Compromised Third-Party Service Providers

The Cyber Threat Intelligence Unit at BGD e-GOV CIRT has identified a surge in cyber-attacks targeting organizations through the compromise of third-party service providers. Recently, multiple organizations in Bangladesh have encountered data breaches. Some individuals employed by third-party service providers, tasked with offering technical support to various client organizations, have been targeted by information-stealing malware. Investigations revealed that the information-stealing malware covertly extracted sensitive data,...

Read More

0 / / Feb 08, 2024