Threat Actor Characterization
PalachPro
ID: 8e42712d8e2d0d7d6090bd2c3b4c94b794908| palach | PalachTech | Th************ | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
PalachPro is a pro‑Russia Telegram hacktivist/cyber-operator brand associated in OSINT with hack‑and‑leak claims (including alleged exfiltration and intent to sell data), co-claims with other brands (e.g., Eye Of Sauron in the Sonata messenger narrative), and OT/ICS-themed access claims discussed in technical analysis with validation caveats. ATT&CK mapping is conservative and emphasizes social-platform coordination/propaganda, data exfiltration intent/claims, and opportunistic abuse of exposed services/weak credentials as plausible enabling paths (labeled INFERENCE where not directly evidenced).
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1585.001 | Social Media Accounts | TA0042 | |
| T1567 | Exfiltration Over Web Service | TA0010 |
|
| T1583.006 | Web Services | TA0042 |
|
| T1133 | External Remote Services | TA0001 TA0003 |
|
| T1498 | Network Denial of Service | TA0040 |
|
PalachPro — Pro‑Russia Hacktivist / “Cyber Operator” Brand (Hack‑and‑Leak Claims + OT/ICS Access Narratives)
Classification: TLP: WHITE — Open Source Intelligence (OSINT)
Category: Cyber / Hybrid — Disruption + hack‑and‑leak claims; OT/ICS access narratives; Telegram‑amplified propaganda
Assessed home base: INFERENCE: Russia-identified / Russia-linked in self-presentation (confidence: medium-high); exact geography remains unconfirmed.
Executive Summary
PalachPro is a pro‑Russia‑aligned hacktivist/cyber‑operator brand visible primarily through Telegram presence, claim-driven incident narratives, and third‑party analytical reporting. The group is associated with (a) hack‑and‑leak style claims targeting Ukraine-aligned entities and European organizations, (b) co-claiming with other brands (notably Eye Of Sauron in the “Sonata Messenger” narrative), and (c) OT/ICS-themed access claims (CCTV/HVAC and industrial targets) discussed in technical analysis.
The most analytically valuable, higher-quality OSINT reference in the reviewed set is Google Cloud Threat Intelligence, which states that PalachPro claimed to have targeted multiple Italian defense companies in November 2025 and alleged data exfiltration, including a claim to sell the data. A separate technical write-up from Forescout analyzes Russian-aligned hacktivist activity and includes a persona (“DarkWarios”) described as being from PalachPro and TwoNet, with claims of access to CCTV systems and even HVAC in government contexts; the same analysis notes validation limitations and victim denials in at least one case, underscoring the need for telemetry-based confirmation.
IOC Appendix (TLP:WHITE) — PalachPro
Note: Reviewed OSINT provides limited stable malware/C2 indicators uniquely attributable to PalachPro. This appendix prioritizes behavioral indicators and correlation cues aligned to hack‑and‑leak and opportunistic access operations.