You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Soothing Hyena

Soothing Hyena

ID: e82cebf6589f877e468a5b4f2d381c38
Cybercrime Defacement Operator
Threat types: Defacement
Ukraine UNKNOWN
Updated: 2026-01-26
Created: 2025-10-25
Progress: 61% Completeness: 57% Freshness: 70%
Operation zone: UNKNOWN
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Technique Technique name Tactics Evidence
T1190 Exploit Public-Facing Application TA0001
  • 2022-02-26 — INFERENCE from UCA ecosystem: exploitation of public-facing applications commonly used by Ukraine-aligned hacktivists; not directly evidenced for the alias. · ref
T1041 Exfiltration Over C2 Channel TA0010
  • 2016-03-01 — INFERENCE from UCA practice of hack-and-leak via public channels; no direct evidence for 'Soothing Hyena'. · ref
T1485 Data Destruction TA0040
  • 2022-02-26 — INFERENCE: occasional destructive outcomes within UCA-aligned operations; not attributed to the alias. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-30T16:10:42+00:00
Soothing Hyena — unconfirmed alias reportedly linked to Ukrainian Cyber Alliance (UCA)

CLASSIFICATION: Unclassified / Open Source Intelligence (OSINT)

Category: Cyber / Hacktivism — Origin: Unconfirmed; reportedly Ukraine-aligned (unverified)

Executive Summary


“Soothing Hyena” appears in your tasking as a hacktivist alias allegedly associated with the Ukrainian Cyber Alliance (UCA). As of 2025-10-27, open sources reviewed do not yield authoritative references that independently document this handle’s operations, channels, or claims. To preserve analytic rigor, this dossier treats Soothing Hyena as an unconfirmed identity and focuses on the UCA operational context as the nearest validated frame. The UCA is a pro-Ukraine hacktivist coalition formed in 2016 (FalconsFlame, Trinity, RUH8, CyberHunta) and active through the 2022–2025 war period, conducting hack-and-leak, destructive intrusions, and DDoS coordination with volunteer ecosystems (e.g., IT Army). Confidence for the existence and activity of UCA is high; confidence that Soothing Hyena is a distinct operator within UCA is low pending evidence.


Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for CISO (one page)

What to know now: Alias “Soothing Hyena” lacks verified OSINT footprint; if tied to the UCA ecosystem, expect opportunistic attacks on exposed services, public claims, and potential destructive impacts tied to wartime narratives.

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook (baseline—no alias-specific artifacts)

Hunt 1 — Exposed admin POST anomalies (web panels & backup consoles)

Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2025-11-25T20:46:01+00:00

IOC Appendix (TLP:WHITE)

No alias-specific IOCs are asserted.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/0

No social links registered for this profile.
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.