You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
LulzSec Muslims

LulzSec Muslims

ID: 80993fa43a4263cc078b71c01acb555452320
Hacktivist Group Hacktivism
Threat types: Hacktivism, Defacement, Intrusion, DDoS Attack, Pro-Palestine
Unknown FRA, SWE
Updated: 2026-03-14
Created: 2026-02-20
Progress: 83% Completeness: 88% Freshness: 70%
Operation zone: France, Sweden
Aliases Limited alias preview
Luls Sec Muslims LULZSEC MUSLIM'S Lu************************** Lu******************
Lu************
Showing 2 of 5 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

LulzSec Muslims is a hacktivist brand frequently referenced in OSINT as part of a broader pro-Palestinian hacktivist ecosystem. Reporting associates the brand with campaign-driven disruption (primarily DDoS), public claim messaging amplified via Telegram, and occasional website defacement. Claims of deep intrusion or data exfiltration are treated as unproven unless corroborated by victim telemetry; related steps such as scanning/bot capacity are marked as INFERENCE where not directly evidenced.


Technique Technique name Tactics Evidence
T1498 Network Denial of Service TA0040
  • 2024-05-07 — Threat reporting on pro-Palestinian hacktivism discusses campaigns and includes LulzSec Muslims in the actor set referenced for disruption operations. · ref
  • 2024-03-28 — OSINT analysis of pro-Palestine hacktivism cites LulzSec Muslims claims of taking down media websites as part of ongoing campaign waves. · ref
T1491.002 External Defacement TA0040
  • 2024-02-18 — INFERENCE (confidence: medium): Inclusion in 'Operation Deface' alliance reporting supports association with website defacement ecosystems. · ref
  • 2024-02-24 — INFERENCE (confidence: medium): Spanish-language OSINT coverage mirrors the Operation Deface alliance list including LulzSec Muslims. · ref
T1585.001 Social Media Accounts TA0042
  • 2024-05-07 — Threat reporting includes screenshots of Telegram posts tied to campaign announcements, supporting the role of social messaging in operations. · ref
  • 2024-01-01 — Public Telegram channel listings exist for LulzSec Muslims-branded channels; used for monitoring and amplification. · ref
T1595 Active Scanning TA0043
  • 2025-12-18 — INFERENCE (confidence: medium): Government advisory on pro-Russian hacktivists describes opportunistic targeting workflows that commonly involve identifying exposed services; scanning/probing is a common precursor in DDoS targeting. (Used as ecosystem analogue, not attribution.) · ref
Strategic Intelligence
Limited preview
Last updated: 2026-02-22T02:13:00+00:00

LulzSec Muslims — Pro-Palestinian-aligned Hacktivist Brand (DDoS/Defacement/Claims Ecosystem)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hacktivism — Disruption (DDoS) + Website defacement + Influence/claims

Assessed home base: Unclear / transnational; some reporting associates the brand with Indonesia-linked activity (unverified as a firm origin)



Executive Summary

LulzSec Muslims is a hacktivist brand frequently referenced in open reporting as part of a wider pro-Palestinian hacktivist ecosystem active since 2023–2024. Across multiple OSINT publications, the group is associated with politically motivated disruption operations (especially DDoS), public claim messaging, and participation in Telegram-amplified “campaign” frameworks.

Some sources describe LulzSec Muslims as participating in ad-hoc coalition structures (e.g., “Operation Deface” alliance lists) and in broader pro-Palestinian collaboration networks described by research publications. The actor’s public posture is high-visibility: statements and claims are amplified via Telegram and X-like channels, often naming targets and promising further operations.

Confidence is high that LulzSec Muslims is an active brand used in hacktivist claim ecosystems and that its dominant operational effect is disruption and propaganda signaling. Confidence is medium for claims of data exfiltration or deep intrusions because many such assertions are reported as claims without consistent technical artifacts.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — LulzSec Muslims


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — LulzSec Muslims (DDoS + Defacement Campaigns)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-22T02:14:10+00:00

IOC Appendix (TLP:WHITE) — LulzSec Muslims

Note: Open sources reviewed emphasize DDoS disruption and public claims and do not provide stable, high-fidelity technical indicators (malware hashes, consistent C2 domains) attributable to LulzSec Muslims. This appendix focuses on behavioral indicators, early-warning cues, and scoping references.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-22T02:14:23+00:00

OSINT Library — LulzSec Muslims


2024-05-07 — Radware — “Pro-Palestinian Hacktivists Target US Education and Government Organizations”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/2

Address Verification SOCMINT
t.me/lul********** Restricted Not integrated
t.me/Lul************* Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–3 of 3 images
Logo Free Preview
Logo
Reference image Free Preview
Reference image
Reference image Free Preview
Reference image