Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
22C
ID: e1f46b8cbf7c9c514048ed97dacf7a6b93073
Hacktivist Group
DDoS Crew
Hacktivism
Threat types: Intrusion, DDoS
Progress: 58%
Completeness: 44%
Freshness: 90%
Operation zone: —
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: low-medium
22C — Russia-aligned hacktivist label with DDoS-first posture and claim-heavy narratives; notable for unverified high-visibility claims (e.g., ChatGPT outage, Jan 2025) amplified via Telegram.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1585 | Establish Accounts | TA0042 |
|
| T1102 | Web Service | TA0011 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
22C — Russia-Aligned Hacktivist Label (Claims-Heavy, DDoS-First)
CLASSIFICATION: Unclassified / Open Source
Executive Summary
22C appears in the pro-Russia hacktivist constellation as a claims-heavy brand with DDoS-first posture and sporadic assertions of higher-impact “hacks.” Public reporting ties 22C to cause-based waves and one high-visibility claim (alleging involvement in a ChatGPT global outage, January 2025) that lacks corroborating technical artifacts—treat such statements as propaganda until verified. Confidence: low–medium (media relays of Telegram claims; limited primary telemetry).
- Identity. Pro-Russia narrative alignment; Telegram for ops/claims; often co-mentioned alongside UserSec/NoName ecosystems. INFERENCE (medium) from ecosystem coverage.
- Objectives. Visibility via DDoS claims and opportunistic exploitation narratives, tied to news cycles. INFERENCE (medium).
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.