You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
22C

22C

ID: e1f46b8cbf7c9c514048ed97dacf7a6b93073
Hacktivist Group DDoS Crew Hacktivism
Threat types: Intrusion, DDoS
Russia
Updated: 2026-04-07
Created: 2025-10-20
Progress: 58% Completeness: 44% Freshness: 90%
Operation zone:
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

22C — Russia-aligned hacktivist label with DDoS-first posture and claim-heavy narratives; notable for unverified high-visibility claims (e.g., ChatGPT outage, Jan 2025) amplified via Telegram.


Technique Technique name Tactics Evidence
T1498 Network Denial of Service TA0040
  • 2024–2025 — Pattern of DDoS-centric campaigning within pro-Russia coalitions (ecosystem reporting). · ref
T1585 Establish Accounts TA0042
  • 2024–2025 — Telegram accounts/channels used for branding, tasking, and claims. · ref
T1102 Web Service TA0011
  • 2024–2025 — Web-service (Telegram) as operations broadcast medium across the DDoS ecosystem. · ref
T1190 Exploit Public-Facing Application TA0001
  • 2025-01-23 — 22C claimed involvement in a global ChatGPT outage—claim not corroborated by technical artifacts. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-21T02:21:36+00:00
22C — Russia-Aligned Hacktivist Label (Claims-Heavy, DDoS-First)

CLASSIFICATION: Unclassified / Open Source


Executive Summary

22C appears in the pro-Russia hacktivist constellation as a claims-heavy brand with DDoS-first posture and sporadic assertions of higher-impact “hacks.” Public reporting ties 22C to cause-based waves and one high-visibility claim (alleging involvement in a ChatGPT global outage, January 2025) that lacks corroborating technical artifacts—treat such statements as propaganda until verified. Confidence: low–medium (media relays of Telegram claims; limited primary telemetry).

  • Identity. Pro-Russia narrative alignment; Telegram for ops/claims; often co-mentioned alongside UserSec/NoName ecosystems. INFERENCE (medium) from ecosystem coverage.
  • Objectives. Visibility via DDoS claims and opportunistic exploitation narratives, tied to news cycles. INFERENCE (medium).
Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/1

Address Verification SOCMINT
t.me/RU2**** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.