Threat Actor Characterization
Coup Team
ID: e082c12d2ca61794b37aee719e982311| CoupTeam | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Coup Team is a hacktivist disruption brand repeatedly listed in public reporting as participating in coordinated or loosely coordinated DDoS campaigns, typically aligned to pro-Russian narratives. The most consistent behavior is short-lived service disruption (DDoS) amplified via public claims and Telegram coordination.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1498 | Network Denial of Service | TA0040 |
|
| T1499 | Endpoint Denial of Service | TA0040 |
|
| T1595 | Active Scanning | TA0043 |
|
| T1583 | Acquire Infrastructure | TA0042 |
|
| T1102.002 | Bidirectional Communication | TA0011 |
|
| T1491.002 | External Defacement | TA0040 |
|
Coup Team — Pro‑Russian hacktivist brand associated with the “Killnet” ecosystem (DDoS / disruption claims)
Classification: TLP:WHITE - Open Source Intelligence (OSINT)
Category: Cyber / Hacktivism (disruption / DDoS) - Origin: Russia-aligned (INFERENCE, confidence: medium)
Author: iQBlack CTI Team [
Executive Summary
Coup Team is an online hacktivist label repeatedly listed in public reporting as participating in coordinated or loosely coordinated DDoS and disruption campaigns in support of geopolitical narratives. Multiple open sources place Coup Team alongside well-known pro‑Russian hacktivist brands and “collectives” (e.g., NoName057(16), HackNeT/HakNet, CyberDragon, UserSec, and other “Killnet‑adjacent” clusters). The most consistent, evidence-backed activity profile is service disruption (DDoS) and public “claim” messaging, rather than technically sophisticated intrusion tradecraft.
A visible activity window in public reporting occurred around June 2024 in the context of EU election‑related hacktivist DDoS claims, where Coup Team is enumerated among claiming groups. Additional reporting and compilations during 2024–2025 continue to list Coup Team among hacktivist actors observed claiming DDoS during conflict‑driven campaigns. Open sources also indicate an associated Telegram presence used for posting targets, claims, and rhetoric.
Confidence is medium that Coup Team should be modeled as a hacktivist “brand” operating within a broader pro‑Russian disruption ecosystem (not necessarily a single stable team). Confidence is low‑to‑medium on granular technical specifics (tooling, botnet composition, infrastructure ownership) because public sources often summarize claims and group lists without exposing underlying telemetry.