You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Vector-Z

Vector-Z

ID: bdf1f3da4c4ba100e940cdffd00d7fe782575
Hacktivist Group Hacktivism
Threat types: Hacktivism, Intrusion, DDoS Attack, Pro-Russia
Russia UKR
Updated: 2026-04-12
Created: 2026-02-22
Progress: 90% Completeness: 85% Freshness: 100%
Operation zone: Ukraine
Aliases Limited alias preview
VectorZ
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Vector‑Z is a pro‑Russia-aligned hacktivist brand referenced in OSINT primarily via coalition/campaign mentions and DDoS claim activity. Public monitoring posts describe an alliance with BD Anonymous Team and a campaign narrative ('Shortcircuit') framed around disruption of Ukraine morale and networks. Evidence supports a disruption-first posture and propaganda/claim amplification; specific impacts are often unverified and should be validated via telemetry. Preparatory steps are labeled INFERENCE where not directly evidenced.


Technique Technique name Tactics Evidence
T1498 Network Denial of Service TA0040
  • 2025-02-13 — Monitoring post describes Vector‑Z claiming DDoS targeting of Skyeton (skyeton.com); impact should be validated. · ref
T1585.001 Social Media Accounts TA0042
  • 2025-02-12 — Monitoring post describes alliance announcement between BD Anonymous Team and Vector‑Z, consistent with public coalition signaling. · ref
  • 2025-02-17 — Campaign narrative references Vector‑Z among pro‑Russia hacktivists; used for coordination/amplification and morale pressure framing. · ref
T1595 Active Scanning TA0043
  • 2025-12-18 — INFERENCE (confidence: medium): Government advisory describes opportunistic pro‑Russia hacktivists; DDoS targeting typically includes discovery/validation of public endpoints. · ref
Strategic Intelligence
Limited preview
Last updated: 2026-02-23T03:42:22+00:00

Vector-Z — Pro‑Russia‑Aligned Hacktivist Brand (Coalition / Campaign Participation; DDoS Claims)

Classification: TLP: WHITE — Open Source Intelligence (OSINT)

Category: Cyber / Hacktivism — Disruption (DDoS) + coalition signaling; claim‑driven operations

Assessed home base: Unclear / transnational (brand appears as coalition participant in OSINT)



Executive Summary

Vector‑Z is assessed as a pro‑Russia‑aligned hacktivist brand referenced in OSINT primarily via coalition and campaign mentions and DDoS claim activity. Public monitoring posts describe Vector‑Z forming an alliance with “BD Anonymous Team” and participating in a pro‑Russia hacktivist campaign narrative labeled “Shortcircuit,” framed as targeting Ukraine morale and networks.

OSINT also describes Vector‑Z issuing DDoS claims against Ukraine‑linked targets, including a public claim to have targeted the Skyeton website (a Ukrainian unmanned aerial systems manufacturer). These sources are largely claim/monitoring‑driven and do not consistently provide corroborating victim telemetry, so the operational impact of individual claims should be treated as variable.

Confidence is medium that Vector‑Z is a real brand participating in pro‑Russia hacktivist coalition messaging and DDoS claim cycles. Confidence is low–medium regarding its independent capability and the true impact of specific target claims, because reviewed open sources rely heavily on claims and monitoring artifacts rather than independently validated technical evidence.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for Decision Makers — Vector-Z


Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — Vector-Z (Claim‑Driven Coalition DDoS)


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-02-23T03:43:43+00:00

IOC Appendix (TLP:WHITE) — Vector-Z

Note: Reviewed OSINT provides limited stable technical indicators attributable to Vector-Z. This appendix focuses on behavioral indicators and validation cues.

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-02-23T03:43:56+00:00

OSINT Library — Vector-Z


2025-02-12 — FalconFeeds (X) — “Alert: New Hacktivist Alliance — BD Anonymous Team and Vector‑Z announce alliance”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/2

Address Verification SOCMINT
t.me/+2q************** Restricted Not integrated
t.me/+ae************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–4 of 4 images
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Propaganda Free Preview
Propaganda
Logo Free Preview
Logo