Threat Actor Characterization
Vector-Z
ID: bdf1f3da4c4ba100e940cdffd00d7fe782575| VectorZ | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Vector‑Z is a pro‑Russia-aligned hacktivist brand referenced in OSINT primarily via coalition/campaign mentions and DDoS claim activity. Public monitoring posts describe an alliance with BD Anonymous Team and a campaign narrative ('Shortcircuit') framed around disruption of Ukraine morale and networks. Evidence supports a disruption-first posture and propaganda/claim amplification; specific impacts are often unverified and should be validated via telemetry. Preparatory steps are labeled INFERENCE where not directly evidenced.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1585.001 | Social Media Accounts | TA0042 |
|
| T1595 | Active Scanning | TA0043 |
|
Vector-Z — Pro‑Russia‑Aligned Hacktivist Brand (Coalition / Campaign Participation; DDoS Claims)
Classification: TLP: WHITE — Open Source Intelligence (OSINT)
Category: Cyber / Hacktivism — Disruption (DDoS) + coalition signaling; claim‑driven operations
Assessed home base: Unclear / transnational (brand appears as coalition participant in OSINT)
Executive Summary
Vector‑Z is assessed as a pro‑Russia‑aligned hacktivist brand referenced in OSINT primarily via coalition and campaign mentions and DDoS claim activity. Public monitoring posts describe Vector‑Z forming an alliance with “BD Anonymous Team” and participating in a pro‑Russia hacktivist campaign narrative labeled “Shortcircuit,” framed as targeting Ukraine morale and networks.
OSINT also describes Vector‑Z issuing DDoS claims against Ukraine‑linked targets, including a public claim to have targeted the Skyeton website (a Ukrainian unmanned aerial systems manufacturer). These sources are largely claim/monitoring‑driven and do not consistently provide corroborating victim telemetry, so the operational impact of individual claims should be treated as variable.
Confidence is medium that Vector‑Z is a real brand participating in pro‑Russia hacktivist coalition messaging and DDoS claim cycles. Confidence is low–medium regarding its independent capability and the true impact of specific target claims, because reviewed open sources rely heavily on claims and monitoring artifacts rather than independently validated technical evidence.