{
	"id": "576386f9-79d8-46fd-8f2e-be84901e6f25",
	"created_at": "2026-04-06T00:10:35.476106Z",
	"updated_at": "2026-04-10T03:29:19.807875Z",
	"deleted_at": null,
	"sha1_hash": "782a1b11ba244d8f0c11f3caa069dcc2fa219596",
	"title": "Dark Web Profile: Hunt3r Kill3rs",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48674,
	"plain_text": "Dark Web Profile: Hunt3r Kill3rs\r\nPublished: 2024-05-24 · Archived: 2026-04-05 16:37:52 UTC\r\nIn the ever-evolving landscape of cybersecurity threats, new groups like Hunt3r Kill3rs emerge with claims of\r\ndisruptive capabilities. This analysis aims to provide an initial understanding of their activities, considering the\r\nlimited timeframe and absence of concrete evidence substantiating their claims.\r\nOverview of Hunt3r Kill3rs:\r\nHunt3r Kill3rs, a recently surfaced threat group, assert their prowess in cyber operations, including Industrial\r\nControl Systems (ICS) breaches, communication network intrusions, and web application vulnerabilities\r\nexploitation. Despite their claims, the verifiable impact and sophistication of their operations remain unclear.\r\nThe group frequently claims to attack Operational Technology (OT) systems, including recent assertions of\r\ncompromising companies using Unitronics PLCs. Unitronics PLC devices have been a common target for Iranian\r\nthreat actors, particularly during the Israel-Hamas conflict. In response even CISA has issued advisories to\r\nenhance the security of these devices.\r\nIn a notable announcement, Hunt3r Kill3rs claimed to be launching a joint attack with Народная Кибер\r\nАрмия (Cyber Army of Russia). Their stated targets include the US nuclear and electric power industries,\r\nspecifically mentioning the Nuclear Energy Institute and the Electric Power Research Institute. They allege these\r\nresources have been disabled, though independent verification is lacking.\r\nCollaboration announcement\r\nIt is observed that Iranian groups often collaborate with Russian threat actors or at least target similar objectives.\r\nIn this context, it is plausible that information exchange occurs within this pro-Russian hacktivist sphere.\r\nThis hypothesis is supported by the group’s claimed association with Cyber Army of Russia. Cyber Army of\r\nRussia’s extensive network, encompassing pro-Russian or in some context anti-Israel hacktivist collectives like\r\nHigh Society from various countries including Yemen to India, likely facilitates the sharing of information and\r\ntactics.\r\nTechniques, Claims and Targets of Hunt3r Kill3rs\r\nSome of the techniques and claims that we consider important are as follows:\r\nIndustrial Control Systems (ICS) Allegations\r\nHunt3r Kill3rs boast about infiltrating ICS, targeting prominent brands like Siemens and Unitronics. However,\r\nwithout corroborated evidence, the extent of their success in disrupting critical infrastructure remains speculative.\r\nThus, they share screenshots.\r\nLatest Telegram post, an alleged claim of Unitronics PLC infiltration\r\nhttps://socradar.io/dark-web-profile-hunt3r-kill3rs/\r\nPage 1 of 3\n\nCommunication Network Intrusions:\r\nThe group alleges breaches in communication networks, particularly targeting IP phone systems from vendors\r\nsuch as Cisco. Verification of these intrusions and their implications on communication services is pending.\r\nClaims about Cisco IP Phone systems\r\nWeb Application Vulnerabilities Exploitation\r\nHunt3r Kill3rs claim to exploit vulnerabilities in web applications, citing instances like SQL injection attacks on\r\nplatforms such as WordPress-based e-commerce sites. The actual impact on targeted websites and data integrity\r\nrequires thorough investigation. If the claim is true, attacks made by such groups often only result in the website\r\nbeing defaced.\r\nIndustries Supposedly Impacted\r\nConsidering the claims they shared on their Telegram channels, we arrive at the following data.\r\nClaims of disruptions in manufacturing, suggested breaches in transportation systems. Lastly, joint attacks with\r\nНародная Кибер Армия have allegedly targeted the US nuclear and electric power sectors, specifically the\r\nNuclear Energy Institute and the Electric Power Research Institute.\r\nGeopolitical Targets\r\nIsrael: The group’s claims of targeting Israeli cybersecurity centers and critical infrastructure, the first post on\r\ntheir Telegram channel is also about Israel.\r\nOne of the first posts in their Telegram channel\r\nGermany: Alleged surveillance network breaches and infrastructure disruptions. Their latest alleged attack on\r\nGermany targeted a company called Mobotix. The claim suggested that the threat actors have fully penetrated the\r\ninfrastructure and gained live access to cameras around the world.\r\nUkraine: Claims of strategic cyber actions in Ukraine highlight geopolitical motivations, yet evidence is\r\ninconclusive.\r\nUnited States: The claimed joint attack with Народная Кибер Армия on US nuclear and electric power sectors\r\nand targeting companies with Unitronics products were a few examples of their targeting of the US.\r\nConclusion\r\nHunt3r Kill3rs’ emergence underscores the ongoing challenges in discerning genuine threats from exaggerated\r\nclaims in the cybersecurity domain. As a relatively new group with unverified assertions, their activities warrant\r\ncautious monitoring and thorough investigation by cybersecurity experts and relevant authorities.\r\nRecommendations\r\nGiven the speculative nature of Hunt3r Kill3rs’ claims, organizations should:\r\nhttps://socradar.io/dark-web-profile-hunt3r-kill3rs/\r\nPage 2 of 3\n\nMaintain heightened vigilance and threat intelligence monitoring without overestimating unverified threats.\r\nConduct rigorous assessments and forensic analysis to validate alleged incidents and assess actual risks.\r\nEnhance collaboration and information sharing within the cybersecurity community to collectively address\r\nemerging threats.\r\nStay informed about evolving tactics and techniques employed by threat actors to adapt defensive\r\nstrategies accordingly.\r\nFinally, it should not be forgotten that operations operating under the name of “hacktivism” can be a screen for\r\nmore dangerous cyber operations, or individual small actions of these groups can cause devastating consequences\r\nwhen they act together.\r\nTherefore, this analysis serves as an initial assessment and encourages a balanced approach in evaluating\r\nemerging cybersecurity threats like Hunt3r Kill3rs.\r\nThe Ultimate Dark Web Compass\r\nMeet the Dark Web Search Engine by SOCRadar, often referred to as the “Google of the Dark Web.” This tool is\r\nyour ultimate guide for navigating the hidden corners of the internet. With state-of-the-art search algorithms and\r\nhighly customizable news feeds tailored to your industry or region, it reveals potential threats with pinpoint\r\naccuracy. Think of it as your advanced radar, scanning the digital landscape and enabling your organization to\r\nidentify and neutralize risks before they breach your defenses.\r\nDark Web News: Receive curated news feeds that provide industry-specific or country-specific intelligence\r\nexactly when you need it.\r\nDark Web Search: Effortlessly search for keywords, IP addresses, emails, domains, hashes, and URLs to conduct\r\nefficient and effective threat hunting.\r\nSource: https://socradar.io/dark-web-profile-hunt3r-kill3rs/\r\nhttps://socradar.io/dark-web-profile-hunt3r-kill3rs/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"references": [
		"https://socradar.io/dark-web-profile-hunt3r-kill3rs/"
	],
	"report_names": [
		"dark-web-profile-hunt3r-kill3rs"
	],
	"threat_actors": [
		{
			"id": "0139355b-377f-42c4-a51f-f49c9bdea0a0",
			"created_at": "2024-06-07T02:00:04.012281Z",
			"updated_at": "2026-04-10T02:00:03.64893Z",
			"deleted_at": null,
			"main_name": "Hunt3r Kill3rs",
			"aliases": [],
			"source_name": "MISPGALAXY:Hunt3r Kill3rs",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434235,
	"ts_updated_at": 1775791759,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/782a1b11ba244d8f0c11f3caa069dcc2fa219596.pdf",
		"text": "https://archive.orkl.eu/782a1b11ba244d8f0c11f3caa069dcc2fa219596.txt",
		"img": "https://archive.orkl.eu/782a1b11ba244d8f0c11f3caa069dcc2fa219596.jpg"
	}
}