Threat Actor Characterization
Kitty Search
ID: c29af20bdf51d2126b7a52f93beb1d8636172| Kitty Cloud | KittySearch | — | — |
Actor Network Graph
Open Network GraphKitty Search — Telegram-based cyber-enablement and leak-search service node
Classification: TLP:WHITE — Open Source Intelligence (OSINT)
Category: Cyber / Supporting Platform / Access-brokering-adjacent service node
Origin: Assessed Russia (Russian-language ecosystem, Russia-tagged Telegram analytics, pro-Russia ecosystem overlap)
Author: iQBlack CTI Team
Executive Summary
Kitty Search is best assessed not as a fully distinct intrusion set, but as a Telegram-based cyber-enablement project operating as a hybrid of leak-search utility, data-access storefront, and publicity channel inside a wider pro-Russia hacktivist and cybercriminal-adjacent ecosystem. Publicly visible channel descriptions present it as a “universal cybersecurity tool” for searching leaked data, analyzing logs, and checking domains and servers through a Telegram bot. The same ecosystem also advertises support contacts, bot subscriptions, and periodic feature updates.
Publicly accessible Telegram analytics pages and archived channel excerpts show Kitty Search linked to the bot identifier @KittySearchV3bot, support contact @krigs_workV2, and the news channel @kittysearchnews. The observable content goes beyond benign OSINT framing: the channel has advertised “admin panel” sales, posted alleged database dumps, discussed document leaks, and cross-promoted with actors and brands such as Morningstar, PalachPro, AvangardSec, and Keymous Plus.