You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
PalachPro

PalachPro

ID: 8e42712d8e2d0d7d6090bd2c3b4c94b794908
Cybercrime Cybercriminal
Threat types: Intrusion, DDoS, Propaganda, Coalition Co-Branding, SCADA
Russia UKR
Updated: 2026-04-12
Created: 2025-10-20
Progress: 94% Completeness: 92% Freshness: 100%
Operation zone: Ukraine
Aliases Limited alias preview
palach PalachTech Th************
Showing 2 of 3 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

PalachPro is a pro‑Russia Telegram hacktivist/cyber-operator brand associated in OSINT with hack‑and‑leak claims (including alleged exfiltration and intent to sell data), co-claims with other brands (e.g., Eye Of Sauron in the Sonata messenger narrative), and OT/ICS-themed access claims discussed in technical analysis with validation caveats. ATT&CK mapping is conservative and emphasizes social-platform coordination/propaganda, data exfiltration intent/claims, and opportunistic abuse of exposed services/weak credentials as plausible enabling paths (labeled INFERENCE where not directly evidenced).


Technique Technique name Tactics Evidence
T1585.001 Social Media Accounts TA0042
  • 2025-11-09 — PalachPro maintains a Telegram channel and uses a contact bot (@OtryadPalachBot), indicating social-platform coordination and dissemination. · ref
  • 2025-11-09 — Secondary reporting amplifies claims originating from Russian Telegram sources (e.g., Mash). · ref
T1567 Exfiltration Over Web Service TA0010
  • 2026-02-10 — Google Cloud TI notes PalachPro claimed data exfiltration from Italian defense companies and claimed intent to sell the data (Nov 2025 timeframe). Treat outcomes as claim-based without victim telemetry in this deliverable. · ref
T1583.006 Web Services TA0042
  • 2025-10-09 — INFERENCE (confidence: medium): Technical analysis describes claims involving internet-exposed devices with weak credentials and access narratives; used as an exposure-risk baseline. · ref
T1133 External Remote Services TA0001 TA0003
  • 2025-10-09 — INFERENCE (confidence: medium): OT/ICS-themed access narratives are consistent with abuse of externally accessible remote services/devices; validation varies per analysis. · ref
T1498 Network Denial of Service TA0040
  • 2025-12-18 — Government advisory describes opportunistic pro‑Russia hacktivist disruption patterns affecting critical infrastructure; used as ecosystem baseline. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-04-13T01:03:21+00:00

PalachPro — Pro‑Russia Hacktivist / “Cyber Operator” Brand (Hack‑and‑Leak Claims + OT/ICS Access Narratives)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hybrid — Disruption + hack‑and‑leak claims; OT/ICS access narratives; Telegram‑amplified propaganda

Assessed home base: INFERENCE: Russia-identified / Russia-linked in self-presentation (confidence: medium-high); exact geography remains unconfirmed.



Executive Summary

PalachPro is a pro‑Russia‑aligned hacktivist/cyber‑operator brand visible primarily through Telegram presence, claim-driven incident narratives, and third‑party analytical reporting. The group is associated with (a) hack‑and‑leak style claims targeting Ukraine-aligned entities and European organizations, (b) co-claiming with other brands (notably Eye Of Sauron in the “Sonata Messenger” narrative), and (c) OT/ICS-themed access claims (CCTV/HVAC and industrial targets) discussed in technical analysis.


The most analytically valuable, higher-quality OSINT reference in the reviewed set is Google Cloud Threat Intelligence, which states that PalachPro claimed to have targeted multiple Italian defense companies in November 2025 and alleged data exfiltration, including a claim to sell the data. A separate technical write-up from Forescout analyzes Russian-aligned hacktivist activity and includes a persona (“DarkWarios”) described as being from PalachPro and TwoNet, with claims of access to CCTV systems and even HVAC in government contexts; the same analysis notes validation limitations and victim denials in at least one case, underscoring the need for telemetry-based confirmation.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — PalachPro


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — PalachPro (Hack‑and‑Leak Claims + OT/ICS Exposure Risk)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-23T02:31:28+00:00

IOC Appendix (TLP:WHITE) — PalachPro

Note: Reviewed OSINT provides limited stable malware/C2 indicators uniquely attributable to PalachPro. This appendix prioritizes behavioral indicators and correlation cues aligned to hack‑and‑leak and opportunistic access operations.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-23T02:31:44+00:00

OSINT Library — PalachPro


2026-02-10 — Google Cloud Threat Intelligence — “Threats to the Defense Industrial Base (mentions PalachPro claims vs Italian defense firms; exfil + sale claim)”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/13

Address Verification SOCMINT
x.com/Pal****** Restricted Not integrated
Address Verification SOCMINT
t.me/pal********* Restricted Not integrated
t.me/rus*********** Restricted Not integrated
t.me/Otr************ Restricted Not integrated
t.me/+XY************** Restricted Not integrated
t.me/+73************** Restricted Not integrated
t.me/Pal******* Restricted Not integrated
t.me/Pal**************** Restricted Not integrated
t.me/PaI****** Restricted Not integrated
t.me/Pal********* Restricted Not integrated
t.me/pal************** Restricted Not integrated
t.me/hac******* Restricted Not integrated
t.me/pal*********** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–3 of 3 images
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda