Threat Actor Characterization
Liwaa Muhammad
ID: 7e4300d61387b4122e9dbde567aedccb43759| Liwa’ Muhammad ﷺ | Liwaa Mohammad | Li************ | li********** |
| Mo************* | Mu************** | لو******* | لو********* |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Liwaa Muhammad, also seen as Mohamed Brigade or Liwaa Mohammed, is assessed as a Cyber Islamic Resistance-aligned hacktivist brand closely tied to the actor zerodayx1 / Karim Fayad in public reporting. It mixes propaganda, cyber-claim amplification, service promotion and, by 2025–2026, clear overlap with BQTLock ransomware operations.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1583.006 | Web Services | TA0042 |
|
| T1587.001 | Malware | TA0042 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
Liwaa Muhammad
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Category: Hacktivism / CIR-aligned group - Origin: Likely Middle East / Lebanon-linked online milieu
Author: iQBlack CTI Team
Executive Summary
Liwaa Muhammad, also seen as Mohamed Brigade or Liwaa Mohammed, is assessed as a Cyber Islamic Resistance-aligned hacktivist brand closely tied to the actor zerodayx1 / Karim Fayad in public reporting. It mixes propaganda, cyber-claim amplification, service promotion and, by 2025–2026, clear overlap with BQTLock ransomware operations.
Public reporting indicates that this actor or brand matters less because of bespoke technical sophistication than because of its position inside a wider mobilization, propaganda, ransomware, or coalition ecosystem.