Friday, April 18, 2025

Build an AI-Powered DNS Analyzer

An AI-generated image


Context 

Due to some geeky security interest I needed a solution to capture and analyze the web traffic of the devices in my home. 

I installed Pi-Hole on an old Raspberry Pi 2 and configured it as a local DNS server to be used by my router. So, every internet connection request by the devices in my local network are logged into this small rpi2 and I can analyze local network traffic with the convenient web user interface of Pi-Hole. 

The process of analyzing logs for a basic network overview is tiresome, especially when I’m just looking for a summary of my local network internet traffic for any anomaly e.g. adware activities and pornography consumption 

Planning

I wanted to automate the process local internet traffic summarization the following way

- Collect network traffic after an X-hour interval

- Filter out unique queries as there might be multiple logs for the same DNS query

- Send the DNS queries to Gemini for a summary 

- Send a notification email to me 


Setup  



- Install Pi-Hole on rpi2

- Assign the rpi2 a static IP address so it has a unique identity as a DNS server in the local network

- Confiture the router to use the rpi2 IP address as its primary DNS server

- Configure the Pi-hole AI Analyzer in a cron job into the rpi2 to do an analysis cycle after X hours.

The analysis cycle is Collecting DNS query from Pi-Hole API endpoint → Sanitizing the Queries → Send it to Gemini for summarization → Send an email to me 


Development 

The implementation is pretty simple that a beginner to intermediate level enthusiast can easily code in Python and deploy the total system in 7days. So, I used Google’s AI studio to generate code. Once done, I reviewed  the code and deployed it into my local rpi2. 


Testing and Findings

The project is for personal use and in the PoC phase. So far it is working fine for the past few weeks without any system crash or major mistakes. 

The language model reads the urls only and try to assume any inconsistent network traffic. So, it misses some dns that can be understood by human analyzers, for example, a content delivery network dns record of a little known adult content website. 


To Dos 

-  Checking dns records against known blacklists, URLhaus and Virustotal before directly sending it to the LLM entity for summarization 

- Put time interval in getting Pi-hole DNS logs

Repository

Pi-hole_AI_Analyzer

 

Wednesday, April 16, 2025

Myths and reality of a parallel world’s defence mechanism (2019)

An AI generated image


The article was published in the Youth page (now defunct) of New Age on August 18, 2019

Going down the rabbit hole

Where am I when I'm not in reality or in my imagination?

— Domenico in Andrei Tarkovsky’s ‘Nostalghia’


APART from the 90s hacker movies to the recent Noah Harari’s prophecy, a conscious observer cannot deny that the line between ‘real’ and ‘virtual world’ has become greyer as Elon Musk ‘reveals brain-hacking plans’ and Facebook ‘funds AI mind-reading experiment’.


On the one hand, creative criminal minds around the world are not only manipulating these sophisticated latest technologies or the devices connected to the internet, but the human brains in forms of pornography, blue whale challenge, triggering communal unrest using manipulated religious photos (Nasirnagar in Bangladesh on October 30, 2016), engineering elections in different countries or recent trend of spreading rumour over social media that claimed a number of innocent lives in lynching.


On the other hand, tech giants like Google and Facebook are also accused of stealthily mining users’ various forms of data, instead of gold, that would be invaluable in near future to exploit a huge number of human beings for social, economic and political purposes, according to experts.


Once science fiction or luxury has become inevitable part of life and the differences between human and machine are transforming into similarities.


All these issues have triggered the necessity of acquiring at least basics of how to live in the parallel universe of cyber world — the playground of ‘Mad Hatters’ and ‘Mad Haters’.


Hackers, cyber criminals and cyber security

MOST of us, blinded by the media and movie industries, often misinterpret the terms hacking and cybercrime by using them interchangeably. It is also hard to keep pace with the leapfrogging shiny technologies and harder to get deeper knowledge about how do they work under the hood.

So, the realm of cyber security remained vague as the aforementioned terms are closely related to it.

Let us start with some myth busters. Firstly, hacking is not something that is represented in movies and media; at all.

According to Richard Stallman, founder of Free Software Foundation and GNU project (to be precise the real Santa Claus), ‘playfully doing something difficult, whether useful or not, that is hacking. You can help correct the misunderstanding simply by making a distinction between security breaking and hacking — by using the term ‘cracking’ for security breaking. The people who do it are ‘crackers’. Some of them may also be hackers, just as some of them may be chess players or golfers.’

Hacking, apart from the technical world, also fits perfectly in arts, music, sports; each and every human activity being done from the ancient time.

Eric S Raymond, a hacker culture Zen Guru, says, ‘There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognise these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in.’

Cyber security, in reality, deals with security in cyberspace, a networked world of humans and machines, where playful and professional hackers are continuously fighting with criminals to protect computers, networks, programs, data and most importantly humans from unauthorised accesses, manipulations, exploitations and attacks that are aimed for any form of harm.

Humans are, above all, the most sophisticated creatures developing technologies for their ease of living from the ancient time. Cyber criminals thus target two things — humans and the technologies.

The first one is social engineering while the later is digital forgery. In movies we are mostly misled by the over representation of digital forgery while the social engineering, that often comes more devastating — is mostly ignored.

Workplace of Beetles, a Bangladeshi cyber security firm

Hacking as passion and profession

MD MUQEET Halim, chief executive officer of Bangladeshi cyber security firm Beetles, talked to New Age Youth as a cyber-security professional and shared his first-hand experiences.


‘Real hacking is totally different from what we watch in movies. For one thing, it is not possible to manually brute-force a 128 bit encryption as seen in the movie ‘Swordfish’. Also, there is no intense background music when we work. There is a lot of background work, understanding of the technology and research that goes behind each of our testing cases,’ he said.


‘A cyber criminal may be someone next to us in a public place or workplace’s cafeteria, or anywhere in the planet earth definitely not someone in hoodies, typing lightning fast random codes on a keyboard in a dark room.


Also, we do not really do all our work on a black screen with green binary sequences running up and down,’ Muqeet added.


According to him, the professional life in cyber security differs from the traditional concept of job. For regular professionals it is a regular job with good working hours while for the pen-testers or the hackers like flexibility in working hours and job conditions that naturally differs from Bangladeshi norms.


Security professionals, moreover, have a great responsibility to their clients and industry as they have to deal with a lot of confidential and sensitive data.


They must adhere to high moral standards and not to be compromised even accidentally, said Muqeet adding, ‘If we slip off, we put the client at risk and that is a burden we must bear.’


He explains the passion of the profession, ‘It is great. We get to break down walls and bypass security measures! It is interesting, challenging and at times highly frustrating and we love it. There is nothing like the thrill of implementing your own exploits and gaining access to a system, or from being able to correctly guess a password and bypassing controls.’


Marketplace, cyber security in Bangladesh and opportunities for youths

ACCORDING to Muqeet, importance of cyber security have drawn attention after the Bangladesh Bank heist in 2016 although people have been working in this sector in Bangladesh for long.


More people are online, businesses are moving towards the cloud technology as well as Bangladesh is becoming a global go-to hub for IT outsourcing and support.


Recent incidents have proven that technologically booming Bangladesh is becoming a regular target of cyber criminals from around the globe and this will increase.


‘But we must not let this deter us from the path that we are on, instead, we need to grow cyber awareness and more businesses need to realise the importance of spending on cyber security. Along with digital Bangladesh, we need to grow digital security,’ said Muqeet, the cyber security expert adding, ‘From our experience of having worked with over 30 clients for the past two years, in various industrial sectors, including the financial, we are overall weak and vulnerable to any major cyber incident.’


‘Due to lack of skilled resources with proper subject matter expertise, we tend to overspend on nonessential items and prioritise them as well, trying to go with the ‘recent trend’, in comparing us with a market with a more overall cyber security maturity.’


When asked about the academic background and certifications needed for youths interested to enter into this adrenalin pumping profession he said that their company looked for people with logical problem solving skills and passion in cyber security. They do not look for any specific academic educational background nor give any high importance to certifications for pen-testers as ‘the profession is all about skills that one accumulates and sharpens.’


What bare minimum everyone must know

CYBER security is all about protecting both human and electronic resources/data from unauthorised local and remote access, change or destruction.


Confidentiality, integrity and availability — known as the CIA triad — are the basic of cyber security.


Confidentiality means to keep the data private, only accessible to people it is meant for. Integrity is to ensure that the data, or the system itself, cannot be altered or changed without proper authorisation. And availability is to ensure that the system can be used when desired or as designed, explains Muqeet adding, ‘This is what any cyber security firm does. We ensure the CIA triad of an organisation. Recently though, it is now also practical to add another property, resilience, what ensures that a system will endure security threats, in the event of an incident, instead of critically failing, because, regardless of what happens, the business must go on.’


People, process and technology are inevitably connected to each other while in most cases people are the weakest among them. They have a tendency to go to random sites, clicking random links from unknown senders, providing personal data to invalidated sites in the hopes of a discount, using free Wi-Fi and then use that same device within the corporate network et cetera possess cyber threats.


Experts suggest end users for not to use public Wi-Fi and using easy to guess passwords like ‘password1234’ or mobile number and writing them down in diary, using two factor authentication and practicing good cyber hygiene for their security.


Muqeet also emphasised auditing IT infrastructure like that of an external financial audit once a year. 


Uncanny social engineers: blue pill, red pill and the one mama gives

You have to understand, most of these people are not ready to be unplugged. And many of them are so inured, so hopelessly dependent on the system that they will fight to protect it.

— Morpheus to Neo in Matrix by Wachowski siblings


MOHAMMAD Asif Chowdhury, lecturer at the department of international relations of Gono Bishwabidyalay, talks about the gray line between the social and cyber world which is often exploited by social engineering — the extremely powerful tool often ignored by film and media.

‘When we talk about social engineering, some ideas come to our mind and those are manipulation, deception, influence, brain wash, propaganda, mob psychology, sense of insecurity et cetera. But the real thing is that society uses engineering to cope with new situation,’ he says.


According to Mohammad Asif, education policy has to be considered as social engineering too. Textbook contents to TV advertisements — everything is in the realm of social engineering.


‘At first I heard about social engineering from Karl Popper, professor at the London School of Economics and Political Science. He wrote several books on political philosophy. The most renowned of them is his 1957 book The Poverty of Historicism, in which he criticised historicism and proposed social engineering. By social engineering he means small changes are made to society in order to cope with the unpredictable future. Critics may term it the anti-communist propaganda. But many thought it is for the development of society.’


‘It may direct from political entities namely political parties or government or from social entities namely social leaders, religious leaders, sect leaders,’ said Asif Chowdhury, also a teacher of department of politics and governance of GB.


But these days, the meaning of social engineering has changed drastically. It has become the means of those who are commonly known as ‘hackers’. It has become the art of deception as popularised by Kevin Mitnick. Hypnotism, deception, manipulation and neuro-linguistic programming et cetera are attached to social engineering and make it more suspicious.


In recent time, social media takes the place of popular media. Its contents, freedom of the users and other flexible features contributed to its immense popularity. At the same time it also has some very dangerous security concerns, according to Mohammad Asif.


Personal securities as well as public securities are in danger when virtual and actual world are merged together. One such example is the recent series of lynching incidents took place in various parts of Bangladesh and India over child lifting rumours.


Cyber criminals make things viral on Facebook and YouTube. The rumours spread to the real world and there are some instances where people are killed by angry mob. ‘It is painful and pathetic that we are living in the very twenty first century with such stupidity. Social engineers (in positive sense like hackers) have to find out the causes behind this and law enforcers would take them away from the society,’ said the Gono Bishwabidyalay teacher.


In the past, politicians like Hillary Clinton and Donald Trump heavily relied on social engineering in order to capture political power by being elected as president of the United States of America. They assigned Facebook and other social media to reach and manipulate voters.


In the UK’s Brexit vote, one of the lethal weapons was Facebook. The social media secretly collected users’ social behavioural patterns, thought process and manipulated them in order to make Brexit possible.


In many instances marketing tactics like ‘micro-targeting’, ‘A/B testing’, ‘narrowcasting’,  ‘choice modelling’ and ‘discrete choice model’ were assigned to influence social media users and they became weapons of mass manipulation, said Asif Chowdhury.


Academic study, professional training

TO KNOW about university programmes offered on cyber security, New Age Youth have contacted Dr Md Shariful Islam, professor and director of the Institute of Information Technology, University of Dhaka.


He says that the basics are taught in the regular courses like software security and other security related ones. ‘So, we have no specific department on cyber security. However, the students later develop their skills in professional life or through specialised trainings,’ Shariful Islam said adding that in every batch some of their students do research work on computer security fields.


Some globally authorised centres in Dhaka provide trainings and arrange international standard examinations like Certified Ethical Hacker (CEH) among others.


Certified Ethical Hacker, trademarked as CE|H, is an International Council of Electronic Commerce Consultants (EC-Council) authorised training-examination.


This is one of the most advanced ethical hacking courses that cover 20 of the most important security domains consisting of hacking techniques and tools used by hackers and information security professionals.


The CEH is a specialised training course for professionals like pen-testers, system administrators, network administrators, web managers, auditors and security professionals in general.


Selim Reza, assistant manager (education) of IBCS-Primax, says about the course details. IBCS-Primax is an EC council and ComTIA authorised training centre in Dhaka that provides CEH training and arranges online exam.


It is now providing the CEHv10 training that mainly focuses on security of cloud computing, mobile platforms, Internet of Things (IoT), backward compatible operating systems and newer vulnerabilities.


The 40 hour course costs Tk 50,000 that includes exam costs (excluding VAT and Tax), said Selim Reza adding that an examinee must obtain 70 per cent marks to pass the four hour examination by answering a total of 125 multiple choice questions.


New Horizons CLC, Dhaka, the franchise of New Horizons Computer Learning Center Inc, Conshohocken, Philadelphia, USA, also offers CEH and other security trainings. Their website contains a precise ‘career map’ for cyber security enthusiasts.


Md Majedul Islam, centre-in-charge of New Horizons CLC Gulshan Branch informed about the syllabus. ‘The institute teaches students, like other training centres, the core 20 modules of  CEH that include, among others, Footprinting and Reconnaissance, Scanning Networks, System Hacking, Trojans and Backdoors et cetera,’ he said.



User end hackers

THE necessity and popularity of free and open source software is gradually gaining vibe among youngsters in Bangla speaking communities.


Availability of faster internet ensured access to do-it-your own videos, open source forums and groups on various social platforms that enabled them to interact closely on problems and sharing solutions/codes that have established them as the user end hackers.


The FOSS people, mostly the GNU/Linux enthusiasts, are more concerned on their security and prefer to develop script or configure their tools according to their taste and geeky interest.


Kuntal Kundu, a FOSS enthusiast from Balurghat India, shares his experience. ‘I prefer authorised websites for browsing and prefer VPN for suspicious ones, torrent sites mainly. I read the review before installing any program. VLC player, Libre Office, Probhat, GIMP, Inkscape and Darktable are some of my necessary tools.’ he said.


One practice is common among them which is not installing any software or run script at once as well as keeping the system minimal which in turn assures an optimised and easy to administrate environment.


They are patient enough to take time to pin point any issue, read documents before installing any software and review scripts or commands before executing. This enables them to maintain the hygiene of the system and becoming a power user.


Saumen Roy, a computer science student of Chittagong University of Engineering and Technology, said, ‘I don’t use any unnecessary packages (software) however mx is most complete distro I have ever seen with lots of extra utilities.’


An English literature major from Government Titumir College, Sammay Sarker says that the default configurations of system and network devices are usually safe. He rather thinks that humans are most vulnerable to cyber threats and emphasised the responsibilities of the users.


He focused on being careful of choosing browser add-ons and learning blocklist syntax on ad-blocks for fine tuning a safer internet surfing.


Sammay also suggests using different passwords on different platforms, using temporary email accounts, instead of main email account, for trivial works, using a reliable password manger to keep passwords safe — KeePass is his favourite and also uses GNU Privacy Guard (GPG) for sharing files or storage on mutual consent.


The self taught hacker is more focused on keeping the system free from unnecessary and resource hungry packages that depends heavily on more packages.


He said, ‘I always look for simple, lightweight programmes and try to read the documentation before installation rather than blindly following instructions available on internet. I always read the changelog before any upgrades. I always keep track of which packages are installed and remove dependencies after the build process.’


He emphasised reading documentations, manuals and keeping an eye on relevant websites like reddit, hackernews et cetera.


For local area network security Sammay uses Openwrt on router, keeps unnecessary ports closed, turns router’s broadcast SSID off and configures firewall for further security.


He says, ‘Most of the solutions are reading the manual and learning the duck-foo or stack-foo.’


Samnan Rahee, a computer science student of Dhaka University, also echoes Sammay and says that he tries to check dependencies before any installation and uses mostly Python to script his own tools.


Epilogue

Awakening is not a thing. It is not a goal, not a concept. It is not something to be attained. It is a metamorphosis. The caterpillar must accept its own disappearance in its transformation. When the marvellous butterfly takes wing, nothing of the caterpillar remains.

― Alejandro Jodorowsky


Filtering information from media and search engines is one of the most important skills to master to survive in the cyber world.


Then comes playing with the devices and operating systems of interest, breaking it — messing up configurations, running arbitrary codes, disassembling hardware — and being solely responsible for making it alive; except living things, they are fragile and might bring collapse like the doom day.


Some tips for enthusiasts

MAKING Quora, Reddit and Stackoverflow a bed-mate; getting detailed answers, being humiliated and filtering to the point technical details from there, in respective order.


One could keep hard copies of reference books of favourite system and languages — human and programming.


An extra plus for keeping Jibanananda Das and Sigmund Freud on book shelf, along with The Art of Deception by Kevin Mitnick and William L Simon, Hacking the Hacker: Learn From the Experts Who Take Down Hackers by Roger A Grimes and UNIX System Administration Handbook by Nemeth, Snyder, Hein, Whaley and Mackin, Social Engineering: The Art of Human Hacking by Christopher Hadnagy among others.


Bookmarking the blogs of Richard Stallman, Julia Evans and Eric Raymond, also the Gentoo and Arch Linux wikis — they are gory, detailed, vast and enlightening.

Reading blogs of Daniel Miessler and Brian Krebs are highly encouraged.

Acquiring basic knowledge on C and Python to feel how Prometheus — Denis Ritchie and Guido van Rossum — snatched fire from heaven.

If skies are too high or too slow (Tarkovsky and Jodorowsky), watching the masterpiece of Wachowski siblings — the Matrix trilogy once again trimming off the technical showoffs.

They are vast and philosophic; and avoiding unabated porn surfing — it is unhygienic in both the cyber and real world.

The Spotter and the Sniper

The story was published in Daily Observer on December 13, 2024 

July 20, 2024, Siddhirganj, Narayanganj


The rotors of an Mi-171 helicopter carved through the gunpowder and tearshell laced air. Its shadow was dancing across the densely packed apartment buildings and roads below like a prehistoric predator filmed in sci fi movies. Inside the copter’s cabin, four figures are seen- two law enforcement officers in tactical gears, and a specialised duo: a spotter and his sniper. The afternoon sun glinted off their equipment, casting occasional flashes across the cabin's interior.


The spotter adjusted his rangefinder, his eyes never leaving the rampage between law enforcers and protesters taking place on the roads below. Sweat beaded on his forehead despite the downdraft from the rotors.

"Mate," the spotter began, his voice crackling through the tactical radio, "been thinking about something. Who do you think AI's going to replace first- us or you trigger-pullers?"


The sniper, a self proclaimed apprentice of Chris Kyle, whose hands hadn't trembled in eleven years of service, methodically checked his .338 Lapua Magnum rifle's chamber. "Not my concern," he replied flatly, his voice carrying the weight of countless operations. "Target neutralisation is my only priority."


The spotter chuckled, the sound mixing with the helicopter's rhythmic thump. "If you ask me, snipers are prime candidates for automation. No offence, but it's basically point-and-click once I feed you the variables. A basic robotic system could handle it- there is no need for fancy AI or complex human calculations."

The sniper's eyes narrowed behind his scope. "That so?" His voice carried a hint of professional pride. "There's more to this craft than following coordinates. Environmental awareness, split-second adjustments, reading the wind's subtle tells- these come from yearsof experience, critical thinking, and countless hours of practice. Show me an AI that can factor in the psychological element of the shot."


"Alright then, son," the spotter challenged, adjusting his position. "Prove it. Show me something that would make even a US military-grade AI jealous."


A Mother at Balcony

A young mother lulls her 7-day old baby to sleep. Sporadic gunshots, shouting and slogan of people coming from the streets. The sound of fine cut air under the rotors of the Mi-171 is swirling nearby. The mother, exhausted from a sleepless night, silently goes to the balcony to have some fresh air.


The Target

Through his scope, the sniper finds his target finally. It stood precisely 437 metres away, partially obscured by the balcony's railing. Wind speed: 8 knots, gusting to 12. Temperature: 33°C. Humidity: 78%. Barometric pressure: 1013 millibars. The helicopter's vibration added another layer of complexity.

He made his calculations, not in cold numbers, but in the language of instinct honed by thousands of hours behind the scope. His target and the steel railing aligned in perfect geometric harmony through his crosshairs.

A sniper from a circling helicopter finds his earnest target to prove how much skills even a military-grade AI needs to achieve to replace him.


The Headshot

The bullet slug, a 250-grain newborn metal child, is finally released with precise aerodynamic calculations summoned upon it leaving behind the dark long vaginal rugae of the barrel, the veteran sniper, the seasoned spotter, and the hideout with a magical, lethal accuracy.


One Asma Begum hears a sudden noise. Most probably it was the slug penetrating the balcony grill, or her daughter collapsed on the floor, or a mix of the both. But certainly it was not the cracking sound of a broken skull quitter than the pre and post bullet hit affects.


The noise suppressed Asma Begum’s wailing, her grand daughter’s cry for her mother’s milk. They failed to resonate the eardrums of Themis escalating the more important and roaring protests against the socio-political injustice taking place in the pre-political past, at that time, now, and in the future...

In the helicopter, the sniper chambered another round with mechanical precision, while the spotter logged the coordinates. Neither spoke.


Guarding against data breach

This post was first published on New Age on February 28, 2025  

An AI Generated Image

THE cyberspace of Bangladesh has made the headlines for breaches on many occasions since the reserve theft of the Bangladesh Bank. The recent one took place in late October 2024 when user data of 5,000 people were leaked from web site that sold tickets for an Atif Aslam concert in Dhaka. All this shows that we have a long way to go to protect our digital landscape.

Data breach

CRIMINALS harvest data off various sources that range from mobile balance recharge points to cyberspace to gain insight into individuals, companies or a group of people by manipulating human minds and machines.

Confidential data meant for the social and the financial use of an individual or business entity becoming available in any form because of unauthorised access constitutes a data breach. The root causes of such breaches, based on what has so far happened in Bangladesh, can primarily be due to two factors — bureaucratic and technical.


Bureaucratic factors

Newspapers published a news report in early October 2024 on national identity data leak from national data repository and a case filed against 19 suspects, who included an adviser on information and communications technology to the prime minister Sheikh Hasina, who was deposed on August 5, 2024 and the minister for state of information and communications technology of the Awami League government, which was toppled the same day.


Another report published in the third week of May 2024 said that some government employees had sold national identity and phone call details on social media. A National Telecommunications Monitoring Centre investigation later found that the group had used login credentials of police officers to access the data and sell them.


The events iterate the traditional abuse of authority, lack of accountability, internal corruption in the administrative system and the negligence of the bureaucrats of citizen rights for personal gain. The lack of accountability contributes a lot to the failure to protect the cyberspace.


A group stole data of 12,000 Agrani Bank clients by hacking into the bank’s e-mail server. The data were sold on online black market in June 2024, as the media reported. The authorities, however, said that that hacking did not take place at the bank, but e-mail of several staff was compromised. This appears a way of the authorities to have avoided their responsibility.


Greek information security consultant Viktor Markopoulos in 2023 ‘detected a leak in a Bangladesh government web site’, revealing the personal data of 50 million Bangladeshis’ when he googled a database error. He is reported to have tried to reach someone responsible for the Bangladesh agency, the Computer Emergency Response Team in the case, but the agency did not respond. What Viktor Markopoulos bumped into indicates a lack of adequate measures to head off unauthorised access to confidential data.


Security inadequacy


THE committee that investigated the 2023 data leak from the Office of the Registrar General, Birth and Death Registration, finds the lack of skilled personnel and improper software development practice to have contributed to technical vulnerabilities. The investigation also showed that the agency had only one programmer and lacked skilled professionals, leading to poor software implementation and inadequate security measures for a critical digital infrastructure of that magnitude. In a recent data breach case, Titas Gas has claimed that the systems were secure as the servers were hosted at the National Data Centre under the management of the Bangladesh Computer Council. A Bangladesh Cyber Security Intelligence report on November 13, 2024, however, claimed that the root access to the firewall was sold on the dark web. The leak of national identity data and call data records can have severe consequences, resulting in various crimes such as identity theft, financial fraud and even threats to national security.

Preventive measures


The July-August uprising has showed how a corrupt administrative system evaluates the mass. People need to be aware of the confidentiality of their own data. The rushed digitalisation created a discrepancy between digital literacy among the people and digital services. As of January, 2025, a number of people did not have adequate knowledge of how to process services online and access personal computers. They, therefore,  depend on local service points that help them with services such as visa applications, national identity cards, birth registration and correction which are all sensitive services. The points and booths where people do their mobile recharge, pay bills and carry out mobile financial services transactions could very well be hotspots of malicious groups to harvest sensitive data. People should be cautious about sharing their confidential data and use trusted computers to gain sensitive services online if they do not have access to a personal device.


Cybersecurity legislation must be implemented to protect rights, confidentiality and national data and clearly define what constitutes crimes in cyberspace rather than using such laws as repressive handles. Public entities entrusted with sensitive data must be held accountable for implementing proper security measures and ensuring protection. The Digital Security Act that the Cyber Security Act replaces seems more like a repressive device rather than an instrument to deter crimes in cyberspace.

Software testing

The practice of traditional ‘test-case-based testing,’ which focuses only on user interface behaviour and some fixed paths to test applications, depends on client’s acceptance criteria and their automation. But regular security scrutiny remains absent. Modern applications are complex and only user interface and acceptance validation cannot resolve all the issues. Because, they are also heavily dependent on application programming interfaces to ensure flawless data sharing.

If testing is given enough time and scope to test these the programming interfaces along with basic security testing as laid out in the Open Web Application Security Project framework framework, simple issues could easily be resolved. More advanced issues will, however, remain for the vulnerability assessment and penetration testing phase, which costlier and is hard to exploit by average cyber criminals.


Forensics and incident response

DATA breach might occur in spite of rigorous security testing, calling for the use of digital forensics and incident response, which has so far remained a less discussed issue of cybersecurity in Bangladesh. Digital forensic investigations help the law enforcement agencies to find finding cybercriminals based on the traces that they leave behind. In incident response, they provide the affected entities with necessary action to head off further breaches and preserve artifacts for a further legal investigation.

The offensive, defensive and investigative cybersecurity practices are becoming more relevant in the fast-growing information technology industry that created a need for educated resources in highly specialised fields. As public entities and information technology companies in Bangladesh eventually take necessary measures to protect sensitive data from criminals, it will create a market demand for digital security professionals.

Frequent data breaches in Bangladesh warrant that the government should fortify cyberspace with proper, adequate measures. While rapidly going digital has brought about advancement, it has also exposed loopholes that threaten privacy, financial stability and national security. Such challenges call for a multi-pronged approach — strengthening technical security, fostering accountability of public agencies and empowering citizens with digital literacy initiatives. By prioritising cybersecurity as a national imperative, the government can mitigate risks, earn trust in digital systems and unlock the potential of the digital economy.

Ishtiaque Foysol is a software tester.

Build an AI-Powered DNS Analyzer

An AI-generated image Context  Due to some geeky security interest I needed a solution to capture and analyze the web traffic of the devices...