threatintel
actor tracker
All actors

KillNet

killnet · primary source: Other · first observed 2021
RU · RussiaHacktivistLow confidencelast cited Nov 20, 2023 · 2y ago

Pro-Russia hacktivist collective; brand reorganized multiple times since its emergence around January 2022. Conducts performative DDoS against Western government, healthcare, and airport sites timed to political flashpoints (U.S. state government sites, the Eurovision 2022 final, hospital networks during the U.S. Healthcare DDoS campaign of early 2023). Impact is typically short-duration website unavailability rather than data loss; the political-signalling value is the point.

Aliases

KillMilk's collectiveOther

Motivations

disruptioninformation operations

Target sectors

governmenthealthcaretransportationmedia

Target countries

USGBDEITESPLLTLVEEROJP

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • KillNet
  • Russia
  • disruption
  • information operations
Capability
Infrastructure
Victim
  • government
  • healthcare
  • transportation
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Timeline

5 events
  1. ReportLow2023-11-21·The Record (Recorded Future News)

    Russian outlet Gazeta.ru names Killnet leader Killmilk as Nikolai Serafimov

    Russian media outlet Gazeta.ru published a report identifying Killmilk, the public leader of the Killnet collective, as a 30-year-old Russian citizen named Nikolai Serafimov, citing other hacktivists and an unnamed law-enforcement source. The Record from Recorded Future News reported the disclosure and noted it could not independently verify the identification. The exposure was followed weeks later by a Telegram post in which Killmilk announced he was 'retiring' from Killnet and handing leadership to Deanon Club.

    killmilkdoxxingleadership
  2. ReportMedium2023-07-20·Mandiant

    Mandiant: Killnet collective shows new capabilities via Anonymous Sudan affiliation

    Mandiant published an analysis of the Killnet collective covering activity from January 2022 onward. The report tracks more than 500 distinct victims between January 1 and June 20, 2023, documents Killnet's shift from a squad-based structure to higher-profile affiliates including Anonymous Sudan, Zarya, Anonymous Russia and Devils Sec, and notes that Anonymous Sudan accounted for roughly 63% of identified DDoS attacks claimed by the collective in 2023. Mandiant assessed with high confidence that operations claimed by Killnet consistently mirror Russian strategic objectives, while stating that direct ties to Russian security services remained unproven.

    ddosanonymous-sudankillmilkreport
  3. AnnouncementMedium2023-03-13·Flashpoint

    Killmilk announces 'Black Skills' private military hacking company

    Killnet founder Killmilk announced on Telegram the creation of 'Black Skills', described as a 'Private Military Hacking Company' modelled on Russian PMCs such as Wagner. According to Flashpoint, the planned structure included subgroups for payroll, public relations, pen testing, data collection, information operations and operations against priority targets, with applicants required to declare prior army or public-service experience. Flashpoint assessed the move as an attempt to make Killnet's capabilities easier to monetise and to position the collective as a cyber-mercenary option for the Russian state.

    ddos-as-a-servicekillmilkrebrandpro-russian
  4. AdvisoryMedium2022-12-22·HHS HC3

    HHS HC3 analyst note warns of Killnet threat to US healthcare sector

    The U.S. Department of Health and Human Services Health Sector Cybersecurity Coordination Center (HC3) published a TLP:CLEAR analyst note characterising Killnet as a pro-Russian hacktivist group active since at least January 2022 that conducts DDoS attacks against nations perceived as hostile to Russia. The note cites recent targeting of a U.S. healthcare organisation and assesses Killnet as a continuing threat to government and critical infrastructure, including the health and public health (HPH) sector. Ties to the FSB or SVR are described as unconfirmed.

    ddoshealthcarehc3advisory
  5. CompromiseMedium2022-05-14·Euronews

    Italian police mitigate Killnet DDoS attempts against Eurovision 2022 grand final

    Italian police said the pro-Russian Killnet collective targeted the Eurovision 2022 grand final and the two earlier semi-finals with DDoS attacks aimed at the contest's network infrastructure during voting and performances. The attempts were mitigated by the Polizia Postale together with ICT Rai and Eurovision TV. Killnet denied the attribution on Telegram and shortly afterwards posted a video declaring 'cyber war' on ten countries supporting Ukraine.

    ddositalyeurovisionpro-russian

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). KillNet — actor profile. Retrieved from https://threatintel.local/actors/killnet

latest cited activity · 2023-11-21