Threat Actor Characterization
TwoNet
ID: 035031254758b51f853749465e75b07196207Actor Network Graph
Open Network GraphMITRE ATT&CK®
TwoNet — pro-Russia hacktivist crew (2025) using Telegram to coordinate DDoS and claim OT/ICS intrusions; high-profile 'water utility' hack was actually a Forescout honeypot revealing weak-credential access and basic HMI/PLC interactions.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1585 | Establish Accounts | TA0042 |
|
| T1102 | Web Service | TA0011 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1562 | Impair Defenses | TA0005 |
|
CLASSIFICATION: Unclassified / Open Source
Executive Summary
TwoNet is a recent entrant (2025) to the pro-Russia hacktivist space, coordinating via Telegram and focusing on DDoS and “hands-on” ICS/OT intrusion claims. In September–October 2025, TwoNet loudly claimed to have breached a Western water utility HMI, disabled alarms/logs, and tampered with PLCs—subsequent investigations by Forescout revealed the “plant” was a honeypot, exposing TwoNet’s TTPs and exaggerations. Despite the embarrassment, the episode shows growing intent by claim-driven actors to probe internet-facing OT. Confidence: high on the honeypot findings; medium on broader capability.
- Identity & posture. Russia-aligned; Telegram coordination; Intel471 and follow-on coverage place emergence in Jan–Jul 2025, recruiting for DDoS and collection.
- Objectives. Visibility through “critical infrastructure” narratives; OT/ICS signaling to amplify fear/attention; routine DDoS against Ukraine/ally targets.