You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Chinafans

Chinafans

ID: 240e334e84f2374ccb21f933726fe1c373689
Hacktivist Group Defacement Crew
Threat types: Intrusion, Defacement, WebShell
China ARG, BRA, CAN, DEU, GRC, IND, IDN, ITA, KEN, MEX, PHL, ZAF, USA, VNM
Updated: 2026-04-06
Created: 2025-10-15
Progress: 82% Completeness: 79% Freshness: 90%
Operation zone: Argentina, Brazil, Canada, Germany, Greece, India, Indonesia, Italy, Kenya, Mexico, Philippines, South Africa, United States, Vietnam
Aliases Limited alias preview
0x 0x_Fans 0***** ad*******
ch******* we********
Showing 2 of 6 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

“chinafans” — administrator of the 0xTeam Network and prolific web-defacer whose mirrors on Zone-H/Zone-Xsec show trademark drop-files such as 0x.txt, o.htm, and xx.htm across many targets. Operates/sells via the ‘0xTeam-Network’ Telegram channel and maintains a public presence; also joined the TurkHackTeam forum as a new member on 26 Nov 2023.


Technique Technique name Tactics Evidence
T1491.002 External Defacement TA0040
  • 2016-07-17 — Defacement mirror using the filename ‘xx.htm’. · ref
  • 2019-04-21 — Defacement mirror using the filename ‘o.htm’. · ref
  • 2021-09-08 — Defacement mirror using the filename ‘o.htm’. · ref
  • 2024-08-15 — Series of mirrors showing ‘0x.txt’ as the defacement artifact (representative entry). · ref
  • 2025-10-08 — Zone-Xsec attacker page shows numerous live mirrors with ‘/0x.txt’ under team tag ‘0xteam’. · ref
T1585 Establish Accounts TA0042
  • 2023-11-26 — Creation/use of a TurkHackTeam forum account (‘chinafans’) – public profile shows join date. · ref
  • 2023-11-27 — Intro thread ‘Hello, Chinafans’ on TurkHackTeam indicates new member status. · ref
  • 2024-2025 — 0xTeam-Network Telegram presence used to publish links, lists, and offers. · ref
T1588 Obtain Capabilities TA0042
  • 2024-2025 — Sale/monetization of compromised web shells advertised on the 0xTeam-Network Telegram channel (‘We are sell random shells’). · ref
  • 2024-12-24 — Public social presence promoting ‘0xTeam-Network’ (identity/brand reinforcement for capability brokerage). · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-15T06:50:21+00:00
“chinafans” / 0xTeam Network

CLASSIFICATION: Unclassified / Open Source


Executive Summary

chinafans” appears in multiple defacement archives as a prolific notifier associated with the 0xTeam Network, repeatedly leaving distinctive drop-files such as 0x.txt, o.htm, and xx.htm on compromised sites. Public artifacts include thousands of Zone-H/Zone-Xsec mirrors showing these filenames across diverse targets and a Telegram channel (“0xTeam-Network”) that advertises “random shells” for sale and links to the notifier’s mirror records. In late 2023, the handle joined the TurkHackTeam (THT) forum as a new member, with a visible profile and intro thread. The OSINT does not prove a larger staffed collective behind 0xTeam; signs suggest a single administrator with possible ad-hoc collaborators (INFERENCE, confidence: low–medium). Overall, the evidentiary base strongly supports persistent external defacement activity and capability monetization; technical vectors for initial access are unspecified in public mirrors.


  • 2016-04–10. Early mirrors show xx.htm/related patterns on multiple hosts (representative entries via IP archives).
  • 2016-07-17. wegielkrapkowice.pl/xx.htm recorded by Zone-H (notified by “chinafans”).
  • 2017-09-03. himalayafairreisen.com/o.htm defacement mirror saved.
  • 2019-04-21. ugc.com.sa/o.htm defacement mirror saved.
  • 2021-09-08. cpedu.in/o.htm defacement mirror saved.
  • 2023-11-26–27. TurkHackTeam forum: account “chinafans” joins (profile + “Hello, Chinafans” thread).
  • 2024. Telegram 0xTeam-Network posts include live links and pricing lists; channel tagline advertises selling shells.
  • 2024–2025. Zone-H/Zone-Xsec show sustained activity with /0x.txt across many domains (representative pages).
  • 2025-10-08. Zone-Xsec attacker page lists current wave of /0x.txt mirrors under team tag “0xteam.”
Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/15

Address Verification SOCMINT
x.com/0xf*** Restricted Not integrated
Address Verification SOCMINT
www.facebook.com/0xf*** Restricted Not integrated
www.facebook.com/wer******* Restricted Not integrated
Address Verification SOCMINT
t.me/hel******* Restricted Not integrated
t.me/chi********** Restricted Not integrated
Address Verification SOCMINT
icq*********** Restricted Not integrated
icq*********** Restricted Not integrated
qq:********* Restricted Not integrated
Sky************* Restricted Not integrated
bro********* Restricted Not integrated
Address Verification SOCMINT
ch*******@gmail.com Restricted Not integrated
Address Verification SOCMINT
www.0xfans.cc Restricted Not integrated
0xfans.wordpress.com Restricted Not integrated
Address Verification SOCMINT
0xfans.github.io Restricted Not integrated
github.com/0xf*** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–4 of 4 images
Hacked website evidence Free Preview
Hacked website evidence
Hacked website evidence Free Preview
Hacked website evidence
Hacked website evidence Free Preview
Hacked website evidence
Avatar used in Telegram ID Free Preview
Avatar used in Telegram ID