Threat Actor Characterization
Z-INQUISITOR
ID: 6510ee192f0b33ba10a9895a3aa93ba437033| Z Inquisitor | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Z-INQUISITOR is an OSINT-observed pro-Russia hacktivist/propaganda brand primarily visible through Telegram-centric messaging and alliance signaling. Actor-specific technical artifacts are limited; risk should be modeled as coalition-adjacent disruption activity (DDoS/defacement narratives) within the broader pro-Russia hacktivist ecosystem.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1499 | Endpoint Denial of Service | TA0040 |
|
| T1593 | Search Open Websites/Domains | TA0043 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1021.005 | VNC | TA0008 |
|
Hunting Playbook — Z-INQUISITOR
Priority / context: Z-INQUISITOR is primarily visible as a Telegram-centric pro-Russia hacktivist brand with limited actor-specific technical artifacts in OSINT. This playbook focuses on the highest-probability, defender-relevant patterns for coalition-adjacent disruption operations: DDoS readiness, edge exposure reduction, claim validation, and early-warning monitoring.
IOC Appendix (TLP:WHITE) — Z-INQUISITOR
Note: Publicly attributable, actor-specific IOCs for Z-INQUISITOR are limited in reviewed OSINT. The items below prioritize huntable patterns and context indicators suitable for correlation, not long-lived blocking.