Threat Actor Characterization
Pro‑Palestine Hackers Movement
ID: 29a0765877c8ff945846d15b13866e4784732| PPHM | PPHM Hacker | Pr***************************** | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1491 | Defacement | TA0040 | |
| T1566 | Phishing | TA0001 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1036 | Masquerading | TA0005 |
|
| T1204 | User Execution | TA0002 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1071 | Application Layer Protocol | TA0011 |
|
| T1583 | Acquire Infrastructure | TA0042 |
|
| T1590 | Gather Victim Network Information | TA0043 |
|
Classification: TLP:WHITE / OSINT / Analytical Product
Author: iQBlack CTI Team
Executive Summary
Pro‑Palestine Hackers Movement (PPHM) appears in OSINT as a decentralized, geopolitically‑motivated hacktivist collective active since October 2023, aligned with pro‑Palestinian narratives and broader anti‑Western hacktivist ecosystems. Its publicly described activity centers on disruptive operations (notably DDoS and website defacement), with occasional claims and reporting that extend into data leaks and opportunistic exploitation of exposed systems. The most detailed public characterization links the collective to a wider coalition referred to as the “Holy League” and to collaboration with multiple hacktivist brands operating on Telegram and adjacent ecosystems.
Operationally, the group’s value proposition is visibility: high‑tempo disruption paired with propaganda amplification across social channels. Where OSINT alleges deeper capabilities (mobile spyware, OT/ICS exploitation, bespoke toolchains), those elements should be treated as higher‑risk but unevenly evidenced and are best handled as capability hypotheses until corroborated by technical artefacts (samples/IOCs) or victim‑side telemetry.
- Type: Hacktivist collective / movement‑style branding (decentralized).
- Stated motivation: Support for the Palestinian cause; opposition to Israel and perceived allied states/organizations.
- Operational model: Coalition‑aligned, campaign‑driven, with coordination and amplification via Telegram and X (Twitter) per OSINT reporting.
- Assessed home base: Unclear / transnational (OSINT describes geographically dispersed members and affiliated groups).
Executive Analyst Brief for Decision Makers — Pro‑Palestine Hackers Movement (PPHM) Situation OverviewPro‑Palestine Hackers Movement (PPHM) is assessed as a movement‑branded pro‑Palestinian hacktivist collective active since October 2023, operating primarily through disruptive campaigns (DDoS, defacement) amplified via Telegram and X. Open sources also associate the brand with a broader coalition (“Holy League”) and multiple collaborating hacktivist groups. The most credible near‑term
Hunting Playbook — Pro‑Palestine Hackers Movement (PPHM) (TLP:WHITE)Scope: This playbook focuses on high‑probability PPHM‑aligned activity patterns: (1) DDoS against public‑facing services, (2) defacement attempts against web stacks/CMS, and (3) opportunistic phishing/social‑engineering during geopolitical campaigns. It is optimized for SOC/DFIR teams operating standard enterprise telemetry (WAF/CDN logs, web server logs, IAM/SSO logs, EDR, email security).Operational Assumptions: PPHM