You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Palestinian Electronic Army

Palestinian Electronic Army

ID: 93471f70195a3e6db81b1ddf987172ce83870
Hacktivist Group Hacktivism
Threat types: Hacktivism, Intrusion, Propaganda
Palestine ISR
Updated: 2026-04-09
Created: 2026-04-09
Progress: 94% Completeness: 96% Freshness: 90%
Operation zone: Israel
Aliases Limited alias preview
Ejército Electrónico Palestino P.E.A. Pa**************** P**
ال************************
Showing 2 of 5 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Palestinian Electronic Army is best assessed as a pro-Palestinian digital activist and propaganda-mobilization brand operating across public social platforms, with limited evidence of autonomous offensive cyber capability and stronger evidence of messaging, mobilization, and doxxing-adjacent pressure.


Technique Technique name Tactics Evidence
T1071.001 Web Protocols TA0011
  • 2022-07-28 — PEA-branded activity is publicly distributed via X/Twitter, and Telegram channels are used for messaging and coordination, consistent with use of application-layer web protocols for communications. · ref
  • 2026-04-09 — PEA-branded Telegram channels @palestain1army and @palestain2army are publicly indexed and used as visible communications layers. · ref
T1589 Gather Victim Identity Information TA0043
  • 2020-08-11 — INFERENCE (confidence: medium): messaging about publishing names of people allegedly sending information to a named adversary is most consistent with gathering and curating victim identity information for intimidation or exposure. · ref
T1592 Gather Victim Host Information TA0043
  • 2020-08-11 — INFERENCE (confidence: low): exposure-oriented messaging implies some level of target discovery and information collection on individuals framed as hostile or collaborative. · ref
T1583 Acquire Infrastructure TA0042
  • 2022-07-28 — INFERENCE (confidence: low): the actor’s persistence across suspended and replacement accounts implies recurring acquisition or recreation of public digital infrastructure at a commodity level. · ref
  • 2026-04-09 — PEA maintains or has maintained branded channels across Telegram and Facebook, consistent with low-end infrastructure acquisition and maintenance. · ref
T1565.001 Stored Data Manipulation TA0040
  • 2026-04-09 — INFERENCE (confidence: low): the Telegram description about closing Israeli Instagram accounts could reflect coordinated reporting or low-end account disruption, but current public evidence is insufficient to treat this as a high-confidence technical effect. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-04-09T22:38:08+00:00

Palestinian Electronic Army — activist cyber-propaganda and mobilization brand

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Category: Hacktivism / Propaganda-Mobilization / Low-confidence cyber activism cluster - Origin: Palestine-facing digital activist environment (exact origin unresolved)

Author: iQBlack CTI Team


Executive Summary

Palestinian Electronic Army (PEA) is best assessed as a loose pro-Palestinian digital activist and propaganda brand rather than a clearly bounded cyber threat group with consistently demonstrated autonomous intrusion capability. Public traces point to a long-running social-media presence across Facebook, X, and Telegram under the “Palestinian Electronic Army” label, with messaging centered on Palestinian solidarity, anti-Israel narratives, online mobilization, and low-barrier digital participation.


The strongest current public evidence indicates that at least some PEA-branded channels emphasize media amplification, translated messaging, social campaigns, and online pressure tactics such as reporting or disrupting Israeli social-media accounts. One Telegram description explicitly frames the mission as publishing translated texts on foreign websites, closing Israeli Instagram accounts, and conducting media campaigns directed at Western audiences. This points to a digitally activist information-operations model rather than a mature offensive cyber unit.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for CISO — Palestinian Electronic Army

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Palestinian Electronic Army


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-04-09T22:41:32+00:00

IOC Appendix — Palestinian Electronic Army

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-04-09T22:41:54+00:00

OSINT Library — Palestinian Electronic Army


2020-08-11 — Facebook / Anonymouss.palestine — “Palestinian Electronic Army exposing those who send information to the spy Fadi al-Salameen”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/7

Address Verification SOCMINT
x.com/pea******** Restricted Not integrated
Address Verification SOCMINT
t.me/pal*********** Restricted Not integrated
t.me/pal********* Restricted Not integrated
t.me/joi********************** Restricted Not integrated
t.me/PAL*********** Restricted Not integrated
t.me/pal*********** Restricted Not integrated
Address Verification SOCMINT
chat.whatsapp.com/Dja******************* Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–1 of 1 images
Logo / Avatar Free Preview
Logo / Avatar