You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Molot Team

Molot Team

ID: b0f30e9e306cf2b21592b5d62555973402636
Hacktivist Group Hacktivism
Threat types: hacktivism, Intrusion, Defacement, DDoS, ICS/OT
Russia HTI
Updated: 2026-03-14
Created: 2025-10-24
Progress: 83% Completeness: 88% Freshness: 70%
Operation zone: Haiti
Aliases Limited alias preview
Molot molotTeam М.******************
Showing 2 of 3 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Molot Team (often stylized M.O.L.O.T./М.О.Л.О.Т.) is a pro‑Russia Telegram hacktivist brand observed in monitoring and indexing sources. The actor is linked to coalition alliance messaging (e.g., StillNet) and to claim-driven narratives including alleged access to industrial control panels. Because actor-specific technical telemetry is limited, ATT&CK mapping is conservative and anchored to the repeatable ecosystem technique described in late‑2025 government advisories: opportunistic abuse of exposed remote access (VNC) against critical infrastructure, alongside disruption (DDoS) and social-platform claim amplification. Data-theft claims (Kyiv orders) are treated as low-confidence and used only as intent signals.


Technique Technique name Tactics Evidence
T1498 Network Denial of Service TA0040
  • 2025-12-09 — Government advisory describes pro‑Russia hacktivist disruption activity and related impacts as a recurring pattern; use as ecosystem baseline for Molot Team-style actors. · ref
T1585.001 Social Media Accounts TA0042
  • 2025-10-12 — Monitoring sources highlight alliance announcements and claim propagation via social platforms; Molot Team is referenced as part of Telegram-amplified hacktivist ecosystems. · ref
  • 2025-11-21 — TGStat channel history snippet references support bot contact for @molotTeam, indicating structured comms/coordination surface. · ref
T1021.005 VNC TA0008
  • 2025-12-09 — Government advisory highlights opportunistic abuse of exposed VNC devices by pro‑Russia hacktivists in critical infrastructure contexts; used as baseline for Molot Team's OT/ICS access claims. · ref
T1133 External Remote Services TA0001 TA0003
  • 2025-12-09 — INFERENCE (confidence: medium): Exploitation/abuse of externally accessible remote services is described in advisory; Molot Team OT/ICS 'panel access' claims are consistent with this pattern. · ref
T1567 Exfiltration Over Web Service TA0010
  • 2025-11-17 — INFERENCE (confidence: low): Digest reports claim of theft of 1500+ Kyiv military admin orders; suggests possible data collection/exfil intent, but not independently corroborated. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-02-23T02:22:26+00:00

Molot Team — Pro‑Russia Telegram Hacktivist Brand (DDoS + ICS/OT Access Claims; Coalition Alliances)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hybrid — Disruption (DDoS) + opportunistic remote access claims (ICS/OT); propaganda/claims via Telegram

Assessed home base: INFERENCE: Russia‑aligned ecosystem (confidence: medium); exact geography unknown



Executive Summary

Molot Team is assessed as a pro‑Russia hacktivist brand operating in Telegram‑amplified ecosystems, commonly represented with the stylized label “М.О.Л.О.Т.” (M.O.L.O.T.). Open sources reviewed for this deliverable are largely claim-driven and index/monitoring-led, but they consistently indicate coalition behavior: alliance announcements with other Telegram hacktivist brands (e.g., StillNet) and repost/forward dynamics.

The most operationally relevant aspect is a set of claims (via Telegram indexing snippets and monitoring posts) describing access to industrial equipment control panels (Italy cited in a post excerpt) and the broader ecosystem trend of opportunistic abuse of exposed remote access (VNC) to affect critical infrastructure. Government and partner advisories in late 2025 describe that pro‑Russia hacktivists leverage widely exposed VNC endpoints to execute opportunistic attacks against critical infrastructure; this provides a strong baseline for how Molot Team’s claimed behaviors should be defended against, even where actor-specific telemetry is absent.

One low-reliability OSINT digest item also reports a claim that Molot Team stole 1500+ “secret orders” from Kyiv’s military administration (document theft claim). Given the sourcing and lack of independent corroboration, this is treated as an unverified claim and used only to inform hypothesis and collection priorities.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — Molot Team


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Molot Team (Opportunistic Remote Access Abuse + Disruption Claims)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-23T02:23:20+00:00

IOC Appendix (TLP:WHITE) — Molot Team

Note: Reviewed OSINT provides limited stable technical indicators uniquely attributable to Molot Team. The most actionable indicators are behavioral, especially around exposed remote access (VNC) and DDoS patterns.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-23T02:23:31+00:00

OSINT Library — Molot Team


2025-10-12 — FalconFeeds (X) — “Alert: New Hacktivist Alliance — M.O.L.O.T. and StillNet announce alliance (monitoring post)”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/2

Address Verification SOCMINT
t.me/mol****** Restricted Not integrated
t.me/MOL************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–5 of 5 images
Affiliation with another group Free Preview
Affiliation with another group
Affiliation with another group Free Preview
Affiliation with another group
Affiliation with another group Free Preview
Affiliation with another group
Affiliation with another group Free Preview
Affiliation with another group
Affiliation with another group Free Preview
Affiliation with another group
Showing 4 of 5 images in preview mode. Additional evidence is restricted for Analyst and Premium plans.