KillNet
Pro-Russia hacktivist collective; brand reorganized multiple times since its emergence around January 2022. Conducts performative DDoS against Western government, healthcare, and airport sites timed to political flashpoints (U.S. state government sites, the Eurovision 2022 final, hospital networks during the U.S. Healthcare DDoS campaign of early 2023). Impact is typically short-duration website unavailability rather than data loss; the political-signalling value is the point.
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
5 events- ReportLow2023-11-21·The Record (Recorded Future News)
Russian outlet Gazeta.ru names Killnet leader Killmilk as Nikolai Serafimov
Russian media outlet Gazeta.ru published a report identifying Killmilk, the public leader of the Killnet collective, as a 30-year-old Russian citizen named Nikolai Serafimov, citing other hacktivists and an unnamed law-enforcement source. The Record from Recorded Future News reported the disclosure and noted it could not independently verify the identification. The exposure was followed weeks later by a Telegram post in which Killmilk announced he was 'retiring' from Killnet and handing leadership to Deanon Club.
killmilkdoxxingleadership - ReportMedium2023-07-20·Mandiant
Mandiant: Killnet collective shows new capabilities via Anonymous Sudan affiliation
Mandiant published an analysis of the Killnet collective covering activity from January 2022 onward. The report tracks more than 500 distinct victims between January 1 and June 20, 2023, documents Killnet's shift from a squad-based structure to higher-profile affiliates including Anonymous Sudan, Zarya, Anonymous Russia and Devils Sec, and notes that Anonymous Sudan accounted for roughly 63% of identified DDoS attacks claimed by the collective in 2023. Mandiant assessed with high confidence that operations claimed by Killnet consistently mirror Russian strategic objectives, while stating that direct ties to Russian security services remained unproven.
ddosanonymous-sudankillmilkreport - AnnouncementMedium2023-03-13·Flashpoint
Killmilk announces 'Black Skills' private military hacking company
Killnet founder Killmilk announced on Telegram the creation of 'Black Skills', described as a 'Private Military Hacking Company' modelled on Russian PMCs such as Wagner. According to Flashpoint, the planned structure included subgroups for payroll, public relations, pen testing, data collection, information operations and operations against priority targets, with applicants required to declare prior army or public-service experience. Flashpoint assessed the move as an attempt to make Killnet's capabilities easier to monetise and to position the collective as a cyber-mercenary option for the Russian state.
ddos-as-a-servicekillmilkrebrandpro-russian - AdvisoryMedium2022-12-22·HHS HC3
HHS HC3 analyst note warns of Killnet threat to US healthcare sector
The U.S. Department of Health and Human Services Health Sector Cybersecurity Coordination Center (HC3) published a TLP:CLEAR analyst note characterising Killnet as a pro-Russian hacktivist group active since at least January 2022 that conducts DDoS attacks against nations perceived as hostile to Russia. The note cites recent targeting of a U.S. healthcare organisation and assesses Killnet as a continuing threat to government and critical infrastructure, including the health and public health (HPH) sector. Ties to the FSB or SVR are described as unconfirmed.
ddoshealthcarehc3advisory - CompromiseMedium2022-05-14·Euronews
Italian police mitigate Killnet DDoS attempts against Eurovision 2022 grand final
Italian police said the pro-Russian Killnet collective targeted the Eurovision 2022 grand final and the two earlier semi-finals with DDoS attacks aimed at the contest's network infrastructure during voting and performances. The attempts were mitigated by the Polizia Postale together with ICT Rai and Eurovision TV. Killnet denied the attribution on Telegram and shortly afterwards posted a video declaring 'cyber war' on ten countries supporting Ukraine.
ddositalyeurovisionpro-russian
Indicators of compromise
0 indicatorsRelated actors
shared ATT&CK techniques- ?? · UnknownAnonymous Sudan2 shared techniques
- UA · UkraineIT Army of Ukraine2 shared techniques
- RU · RussiaNoName057(16)2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). KillNet — actor profile. Retrieved from https://threatintel.local/actors/killnet