Threat Actor Characterization
Shadow Kill Hackers
ID: 8a915a9c5677af420e8bf3b78d244ab5Actor Network Graph
Open Network GraphMITRE ATT&CK®
Shadow Kill Hackers is a thinly documented criminal extortion brand most strongly associated with the October 2019 City of Johannesburg incident. Public reporting supports a ransom demand, claims of stolen municipal data, and public social-media pressure, but not a mature repeat-offender ecosystem.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1005 | Data from Local System | TA0009 |
|
| T1567 | Exfiltration Over Web Service | TA0010 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Category: Cybercrime / Data-extortion - Origin: Unknown
Author: iQBlack CTI Team
Executive Summary
Shadow Kill Hackers is best assessed as a short-lived criminal extortion cluster that became publicly visible during the October 2019 compromise of the City of Johannesburg. Public reporting consistently ties the brand to a ransom demand of 4 BTC, claims of sensitive-data theft, screenshots allegedly showing internal access, and public pressure designed to force payment.
The group is unusual because the strongest open reporting does not support conventional ransomware encryption as the central coercive mechanism. Later retrospective analysis characterized the case as a largely social extortion event: the operators claimed to have stolen financial and personal data and threatened publication if the city did not pay, but no stable evidence base emerged for broad-scale file encryption, mature leak-site operations, or a long-running affiliate ecosystem.
Executive Analyst Brief for CISO — Shadow Kill HackersClassification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITEWhat happenedShadow Kill Hackers is the public label used by the operators who extorted the City of Johannesburg in October 2019. The group claimed access to municipal systems, threatened release of allegedly stolen financial and personal data, and demanded 4 BTC. The city shut down website and e-services as a precaution and later refused payment.Why it mattersThe
Hunting Playbook — Shadow Kill HackersClassification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITEAnalytical positioning: Shadow Kill Hackers is best tracked as a short-lived data-extortion cluster associated with the October 2019 compromise of the City of Johannesburg. Public reporting supports ransom pressure, claimed data theft, screenshots allegedly showing internal access, and service-impact pressure, but does not strongly support a mature ransomware program.Use cas