You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
RuntimeTerror

RuntimeTerror

ID: 9c245e48e871db38693b938327a0e11365907
Cybercrime Cybercriminal Hacktivist
Threat types: Intrusion
Ukraine RUS
Updated: 2026-02-06
Created: 2025-10-25
Progress: 71% Completeness: 72% Freshness: 70%
Operation zone: Russia
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

RuntimeTerror is an assessed persona within the pro-Ukraine hacktivist ecosystem, tentatively associated with the RMRF Group cluster. Public OSINT directly evidences RMRF-linked intrusions and large-scale data leaks against Russian fuel and oil-refining companies, with stolen data (>100 GB) packaged and published via cloud storage. No malware family or toolset is clearly branded to RuntimeTerror personally; accordingly, this ATT&CK mapping is primarily at the RMRF cluster level, with several techniques marked as INFERENCE where procedures are not explicitly documented.


Technique Technique name Tactics Evidence
T1560.001 Archive via Utility TA0009
  • 2024-05-03 — Archive Collected Data: Archive via Utility — OsintFlow announces a new cooperation line with hackers from RMRF Group and presents a leak of more than 100 GB of documents from Russian fuel-trading company Flotsnab; the data is explicitly offered as a downloadable archive, implying that the operators compressed and packaged stolen files prior to publication, consistent with T1560.001 use of archiving utilities before exfiltration. · ref
T1567.002 Exfiltration to Cloud Storage TA0010
  • 2024-05-03 — Exfiltration Over Web Service: Exfiltration to Cloud Storage — The same OsintFlow article on cooperation with RMRF Group provides a Mega.nz link to the >100 GB Flotsnab document dump (archive password set to "RMRF"); this demonstrates that exfiltrated corporate data is staged to public cloud storage and then distributed, matching T1567.002 (cloud storage-based exfiltration and leak publication). · ref
T1595.002 Vulnerability Scanning TA0043
  • 2026-01-19 — INFERENCE (medium confidence) — Active Scanning: Vulnerability Scanning. OsintFlow describes that organizations of Russia’s oil-refining complex are under close scrutiny by Ukrainian ‘birds’ in partnership with RMRF Group, and presents a successful deep compromise of Flotsnab with large internal data theft. Given the nature of the victim (fuel/oil-trading infrastructure) and typical RU–UA hacktivist tradecraft, it is likely that RMRF-linked operators, including the RuntimeTerror persona, employ automated vulnerability and exposure scanning of Russian internet-facing assets to identify targets prior to intrusion, even though specific scanners or commands are not detailed in public reports. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2026-01-19 — INFERENCE (low–medium confidence) — Exploit Public-Facing Application. The documented breach of Russian company Flotsnab, resulting in theft of >100 GB of internal corporate documents and subsequent leak via RMRF–OsintFlow cooperation, implies successful compromise of internal business systems. In absence of detailed kill-chain reporting, exploitation of public-facing web applications, VPNs or remote management portals is assessed as a plausible initial access path, and T1190 is used here as a generic placeholder for this likely but unconfirmed vector. · ref
T1585.001 Social Media Accounts TA0042
  • 2024-10-10 — Establish Accounts: Social Media Accounts — RMRF Group maintains an official, branded Telegram public channel (@rmrfgroup, “RMRF Official Channel 🇺🇦”) used to disseminate news, statements and references to leaks (including links back to rmrf.info and cooperative investigations). This fits ATT&CK T1585.001, in which threat actors establish and operate social media accounts as part of their public presence, influence activity and operations messaging. · ref
T1585.003 Cloud Accounts TA0042
  • 2026-01-19 — INFERENCE (medium confidence) — Establish Accounts: Email Accounts. RMRF Group’s public profiles reference an email contact ([email protected]) alongside chat and channel handles, indicating that the cluster maintains dedicated communication endpoints for coordination, submissions and outreach. While there is no direct evidence of these accounts being abused for phishing or direct intrusion, their existence as operational contact channels is consistent with ATT&CK T1585.003 (threat-run email accounts to support campaigns and liaison). · ref
Strategic Intelligence
Limited preview
Last updated: 2026-01-19T22:31:08+00:00

RuntimeTerror — Preliminary Intelligence

Classification: TLP:WHITE

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

CISO Brief — RuntimeTerror / RMRF-aligned hacktivism

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — RuntimeTerror / RMRF-aligned hacktivism


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-01-19T22:40:25+00:00

OSINT Library — RuntimeTerror / RMRF Group


Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/1

Address Verification SOCMINT
t.me/run********** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.