You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Dark Storm Team

Dark Storm Team

ID: 8c8b24698c3e7d70dc625634a34afbb668798
Hacktivist Group DDoS Crew Hacktivism
Threat types: Intrusion, Defacement, DDoS, Pro-Palestine
Palestine ISR, USA
Updated: 2026-04-07
Created: 2025-10-23
Progress: 91% Completeness: 92% Freshness: 90%
Operation zone: Israel, United States
Aliases Limited alias preview
Dark Storm Dark Storm Hackers Team Da************* Da***********
Da******* D** T** Te*************
Showing 2 of 8 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Dark Storm Team (DarkStrom/Dark Strom Team) is widely described in OSINT as a pro‑Palestinian‑aligned hacktivist group specializing in DDoS campaigns and claim amplification, including use of third‑party 'proof links' (check-host/check-report style) to substantiate claimed outages. OSINT also describes a monetization dimension (DDoS-for-hire and data-sale/leak narratives). ATT&CK mapping emphasizes DDoS disruption and social-platform coordination; broader capability assertions are treated conservatively unless corroborated by victim telemetry.


Technique Technique name Tactics Evidence
T1498 Network Denial of Service TA0040
  • 2025-03-11 — CPR describes Dark Storm Team as specializing in DDoS and claiming responsibility for X outages; proof-link behavior is discussed. · ref
  • 2025-03-11 — CyberScoop describes Dark Storm Team DDoS claim for X outage and notes proof-link usage. · ref
T1585.001 Social Media Accounts TA0042
  • 2024-01-01 — Orange Cyberdefense investigation describes Telegram as coordination/communication surface and coalition behavior for Dark Storm Team. · ref
T1583.006 Web Services TA0042
  • 2024-01-01 — INFERENCE (confidence: medium): OSINT describes DDoS-as-a-service style offerings and monetization narratives, implying use of shared services/infrastructure typical of for-hire disruption ecosystems. · ref
T1595 Active Scanning TA0043
  • 2025-03-11 — INFERENCE (confidence: medium): proof-link pattern implies deliberate validation of target availability and timing as part of campaign execution. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-03-22T04:14:29+00:00

Dark Storm Team (DarkStrom / Dark Strom Team) — Pro‑Palestinian‑Aligned Hacktivist Group (DDoS + Monetized Services)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hacktivism — Disruption (DDoS) + influence/claims; monetization via “for‑hire” services

Assessed home base: Unclear / transnational (OSINT suggests possible Russia links while publicly framed as pro‑Palestinian)



Executive Summary

Dark Storm Team is widely described in OSINT as a pro‑Palestinian‑aligned hacktivist group specializing in distributed denial‑of‑service (DDoS) campaigns and high‑visibility claim amplification. Open reporting and research coverage consistently frame the group as politically motivated (support for Palestine, opposition to Israel and perceived supporters), while also describing a profit‑seeking dimension: DDoS‑for‑hire style services and monetization attempts.

A key observable behavior is the use of third‑party “proof links” (e.g., check‑host/check‑report style availability captures) to bolster credibility for claimed outages. This approach appears repeatedly in coverage of March 2025 X (Twitter) outages, where Dark Storm Team publicly claimed responsibility and provided proof artifacts.

An Orange Cyberdefense investigation describes a decentralized/horizontal structure (unconfirmed), Telegram‑centric coordination, coalition relationships with other groups, and a blend of ideological and financial motivations. It also references broader service offerings (DDoS‑as‑a‑service, leaks, and ransom‑as‑a‑service narratives) and notes possible links with Russia, highlighting attribution complexity.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — Dark Storm Team


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Dark Storm Team (Proof‑Link DDoS Campaigns)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-23T01:19:12+00:00

IOC Appendix (TLP:WHITE) — Dark Storm Team

Note: Public reporting on Dark Storm Team is DDoS- and claim-centric, with limited stable malware/C2 indicators suitable for static IOC blocking. This appendix prioritizes behavioral indicators and correlation cues.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-23T01:19:23+00:00

OSINT Library — Dark Storm Team


2024-01-01 — Orange Cyberdefense (PDF) — “Dark Storm Team — Cyber Intelligence Bureau / Gang Investigation”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/12

Address Verification SOCMINT
x.com/Dar************ Restricted Not integrated
x.com/Dar************ Restricted Not integrated
Address Verification SOCMINT
t.me/Dar************** Restricted Not integrated
t.me/dar*********** Restricted Not integrated
t.meDarkstormteamnewteam Restricted Not integrated
t.me/Dar****************** Restricted Not integrated
t.me/dar************ Restricted Not integrated
t.me/Dar************* Restricted Not integrated
t.me/Dar************ Restricted Not integrated
t.me/Dar*********** Restricted Not integrated
t.me/+N5************** Restricted Not integrated
t.me/Dar************ Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–3 of 3 images
Alliance with AlixSec Free Preview
Alliance with AlixSec
Alliance with Armenian Code Group Free Preview
Alliance with Armenian Code Group
Alliance with inteid Free Preview
Alliance with inteid