Security Navigator 2024 Research-driven insights to build a safer digital society, Adopt a proactive security posture based on cyber threat intelligence.
The Cyber Intelligence Bureau deciphers cyberthreats for you.
Combining OSINT and HUMINT analysis, along with insights into influence vectors and emotional intelligence, these in-depth reports provide a comprehensive view of cybercriminal activities and tactics.
Explore our insights and podcasts to anticipate attacks and strengthen your cyber defense.
UserSec Team Report
UserSec is a pro-Russian hacktivist group formed in 2023, primarily targeting Western countries and NATO members. They use DDoS attacks and data leaks as tactics. Although no official link to the Russian government has been established, their actions align with Russia's geopolitical interests. The group collaborates with other pro-Russian collectives like KillNet, and offers paid DDoS services as well as hacking training.
DarkStorm Team (aka: DarkStrom Team)
Dark Storm Team is a pro-Palestinian hacktivist group that emerged in 2023, targeting Israel, Western countries, and NATO. Their activities combine political and commercial motivations, including DDoS attacks, data leaks, and paid cybercriminal services. Although seemingly pro-Palestinian, their actions also appear aligned with Russian geopolitical interests.
Fatemiyoun Electronic Team (FFE)
Fatemiyoun Electronic Team (FFE) is a pro-Iranian hacktivist group created in 2020. Their activities include attacks on social media, website hacking, and disinformation campaigns, aimed at defending Shia Islam and promoting anti-American sentiments. Controlled by Kataib Hezbollah, an Iranian-backed Iraqi militia, FFE collaborates with other pro-Iranian entities. Recently, they claimed responsibility for cyberattacks against some government websites. The group represents a cyber threat aligned with Iran's geopolitical interests.
NoName057(16) Group
NoName057(16) is a pro-Russian hacktivist group created in 2022, specializing in DDoS attacks. They primarily target Ukraine, NATO countries, and organizations critical of Russia. The group uses Telegram for communication, has developed its own DDoS tool called DDOSIA, and recruits volunteers through the dark web, paying them in cryptocurrency. Their motivations align with Russian geopolitical interests. Although their attacks are usually short-lived, they represent a significant cyber threat capable of temporarily disrupting important online services.