Threat Actor Characterization
SoubearArmy
ID: a51ebeeee9fccf528ada17b7db5c10fdActor Network Graph
Open Network GraphMITRE ATT&CK®
SoubearArmy is a hacktivist brand label reported as part of a pro-Russian DDoS alliance linked to the NoName057(16)/DDoSia ecosystem, with activity expressed primarily as disruptive DDoS campaigns against public-facing services (availability impact) rather than covert intrusion.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1595 | Active Scanning | TA0043 |
|
SoubearArmy — Pro-Russian-aligned hacktivist brand linked to DDoS “alliance” activity
Classification: TLP:WHITE — Open Source Intelligence (OSINT)
Category: Hacktivism / Crowd-enabled DDoS (cluster-level association) - Origin: Russia-aligned ecosystem (INFERENCE, confidence: medium)
Author: iQBlack CTI Team
Executive Summary
SoubearArmy appears in public reporting primarily as one of several hacktivist “ally” brands publicly aligned with the pro‑Russian DDoS ecosystem centered on NoName057(16) and its crowdsourced DDoS tooling (“DDoSia”). Public reporting describes an “alliance” including SoubearArmy and other groups, notably connected to attacks against Italian infrastructure, but provides limited independent, actor‑unique technical artifacts directly attributable to SoubearArmy.
Given the available OSINT, the most defensible analytic stance is to treat SoubearArmy as a label within a broader pro‑Russian hacktivist coalition rather than as a fully distinct intrusion set with unique tooling. Where activity is observed, it is most plausibly expressed through commodity DDoS operations (HTTP floods and related volumetric methods) and/or participation in shared “call‑to‑action” targeting cycles published via Telegram channels affiliated with the wider ecosystem.
Confidence in the coalition linkage is medium (reported “alliance” announcements in multiple sources). Confidence in any specific, independent SoubearArmy infrastructure or bespoke tooling is low due to a lack of uniquely attributable indicators in open reporting. Analysts should therefore model SoubearArmy as a campaign tag for coalition activity and track it as part of NoName057(16)/DDoSia‑style operations, with conservative attribution.