You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Eye Of Sauron

Eye Of Sauron

ID: e6ada4fb02f00af85a4f427e84b4108d04917
Hacktivist Group Hacktivism
Threat types: Hacktivism, Intrusion, Pro-Russia
Russia UKR
Updated: 2026-03-14
Created: 2026-02-22
Progress: 81% Completeness: 85% Freshness: 70%
Operation zone: Ukraine
Aliases Limited alias preview
Sauron Of Eye
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Eye Of Sauron is a pro‑Russia Telegram hacktivist brand referenced in OSINT primarily via claim-driven narratives, notably the alleged compromise/disruption of the Ukrainian military messaging system 'Sonata' (often co-claimed with PalachPro). The open record reviewed is heavy on claims and secondary reporting; therefore ATT&CK mapping is conservative, emphasizing denial-of-service and use of social platforms for coordination/propaganda. Exposed-service/credential abuse is included as INFERENCE where not directly evidenced.


Technique Technique name Tactics Evidence
T1585.001 Social Media Accounts TA0042
  • 2025-11-09 — Telegram channel archives and indexing show Eye Of Sauron using Telegram as the primary communication and claim surface. · ref
  • 2025-11-09 — TGStat listing captures excerpts referencing Sonata being taken down, consistent with claim amplification behavior. · ref
T1498 Network Denial of Service TA0040
  • 2025-11-09 — Secondary reporting and Telegram excerpts describe Sonata being 'taken down' by PalachPro and Eye Of Sauron; treat as claim-driven without victim telemetry. · ref
  • 2026-02-22 — Monitoring post reiterates the Sonata breach narrative and is consistent with disruption/claim posture. · ref
T1133 External Remote Services TA0001 TA0003
  • 2025-11-09 — INFERENCE (confidence: low–medium): claims of access to an active account imply abuse of externally accessible services or credential compromise; method not evidenced. · ref
T1595 Active Scanning TA0043
  • 2025-11-09 — INFERENCE (confidence: medium): targeting and disruption narratives imply discovery/validation of endpoints prior to campaigns. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-02-23T01:48:13+00:00

Eye Of Sauron — Pro‑Russia Telegram Hacktivist Brand (Claims of Compromising Ukrainian Military Messaging)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hybrid — Hacktivism (disruption + access claims) with Telegram‑amplified propaganda

Assessed home base: INFERENCE: Russia‑aligned ecosystem (confidence: medium); exact geography unknown




Executive Summary

Eye Of Sauron is a Telegram-centric pro‑Russia hacktivist brand that appears in OSINT primarily through claims and repost-driven narratives. The most prominent set of claims ties the group (often alongside PalachPro) to the alleged compromise and/or disruption of “Sonata” / “Sonata Messenger,” described in reporting as a messaging system used by Ukrainian military personnel.

A Telegram indexing archive (Telemetr) for the channel “EYE OF SAURON” includes posts framing the activity as a targeted operation and asserting access to an active account of the service, which the group uses to dispute claims that the platform is secure. Additional reporting (often citing Russian Telegram sources) repeats the same narrative and extends it to other claimed targets, including Ukrainian port-related infrastructure.

Because much of the publicly visible record is claim-driven and relies on secondary reporting, confidence is highest in the actor’s existence and propaganda/claim posture, and lower regarding the true operational impact (service-level disruption vs. confirmed system compromise). This profile treats the Sonata narrative as an intent and targeting indicator and emphasizes defender controls aligned to high-probability tactics: exposed service abuse, credential compromise, and disruption operations in campaign windows.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — Eye Of Sauron


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Eye Of Sauron (Claims of Comms Compromise + Disruption)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-23T01:49:23+00:00

IOC Appendix (TLP:WHITE) — Eye Of Sauron

Note: Reviewed OSINT provides limited stable malware/C2 indicators for Eye Of Sauron. This appendix prioritizes behavioral indicators and correlation cues suitable for disruption and exposed-service abuse campaigns.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-23T01:49:36+00:00

OSINT Library — Eye Of Sauron


2025-11-09 — Telemetr.io — “Telegram channel archive: @sauron_of_eye (Eye Of Sauron) — posts about 'Sonata Messenger' compromise and PalachPro collaboration”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/5

Address Verification SOCMINT
t.me/sau********** Restricted Not integrated
t.me/kon******* Restricted Not integrated
t.me/Sau************ Restricted Not integrated
t.me/+M_************** Restricted Not integrated
t.me/eye************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–1 of 1 images
Hacked resources. Propaganda Free Preview
Hacked resources. Propaganda