Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Team Herox
ID: 92087589f8c0fbd16605e9530ea5b11572342
Hacktivist Group
Hacktivism
Threat types: Defacement, DDoS, Intrusion, Claims-driven, Propaganda, Pro-Palestine
Progress: 47%
Completeness: 45%
Freshness: 50%
Operation zone: —
Aliases
Limited alias preview
| TeamHerox | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: low-medium
Team Herox — conflict-era hacktivist label with Telegram claims (anti-Israel posture). Sparse technical artifacts; treat as low-soph DDoS/defacement actor with coalition amplification.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1491.002 | External Defacement | TA0040 |
|
| T1585 | Establish Accounts | TA0042 |
|
Team Herox — South/Central Asia-Aligned Hacktivist Label (Low Artifact, High Noise)
CLASSIFICATION: Unclassified / Open Source
Executive Summary
Team Herox appears in conflict roundups as a pro-Palestinian / anti-Israel hacktivist label operating on Telegram. OSINT shows sporadic claim posts (e.g., claims vs. Israel’s MFA site) and listing in actor rosters documenting the Israel–Gaza cyber spillover. Technical substantiation is limited; treat as low-soph DDoS/defacement oriented. Confidence: low–medium (curated listings + a few claim relays).
- Positioning. Anti-Israel posture; sometimes grouped with Pakistan/Malaysia/Indonesia banners in conflict matrices (heritage uncertain).
- Footprint. Telegram announcements; occasional third-party tweets/feeds relaying claims.
- Objectives. Attention capture and solidarity signaling via nuisance DDoS/defacements; low OPSEC and high channel churn. INFERENCE (medium).
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.