Threat Advisory

TwoNet Hacktivist Campaign Targets OT and ICS Infrastructure

Threat: Malicious Campaign
Threat Actor Name: TwoNet
Threat Actor Type: -
Targeted Region: Ukraine, Lithuania, Spain, Italy
Alias: -
Threat Actor Region: Russia
Targeted Sector: Technology & IT, Government & Defense
Criticality: High

EXECUTIVE SUMMARY

Honeypots are decoy systems exposed to the internet to lure attackers and collect intelligence on their tactics. Previously, our AI-generated –healthcare clinic– honeypot captured ransomware attempts, but recent activity targeted a –water treatment utility– honeypot. A pro-Russian hacktivist group, TwoNet falsely claimed responsibility for a real-world attack on Telegram, though the compromise affected only the honeypot. This highlights hacktivists– growing interest in operational technology and industrial control systems (OT/ICS). Honeypot intelligence provides critical insight into attacker methods, target selection, and emerging threat networks. Observing such activity helps organizations in utilities and critical infrastructure anticipate threats, particularly as actors exploit default credentials and known vulnerabilities.

TwoNet–s attack began with default HMI credentials and SQL queries, eventually extracting schema information. The attackers created a user account –BARLATI– and carried out HMI defacement, PLC manipulation, deletion of data sources, and log evasion over several hours. The focus was on the web application layer, with no host-level exploitation. Intelligence suggests TwoNet blends legacy DDoS tactics with OT/ICS claims and leverages Telegram for signaling doxing, and commercial offerings like ransomware-as-a-service. Additional honeypot activity revealed Russian-linked and Iranian-sourced IPs targeting HMIs and PLCs via Modbus, S7comm, and HTTP, demonstrating manual operation, multi-protocol knowledge, and commodity tooling. The combined observations show how relatively low-skilled actors can interact with OT/ICS systems and highlight the value of honeypots for monitoring both claimed and unclaimed attacks.

TwoNet case shows hacktivist activity is evolving from DDoS and defacement to OT/ICS targeting. While claims should be treated cautiously, monitoring channels provides insight into intent, tools, and emerging alliances. Group collaborations like OverFlame and Z-PENTEST accelerate capability sharing, enabling smaller groups to scale. Utilities, especially water and power sectors, remain attractive targets due to operational impact and security gaps. Manual reconnaissance and tampering by opportunistic or state-linked actors further underscore the persistent threat. Despite the ephemeral nature of hacktivist brands, individual actors and tactics persist, making it essential to track people, infrastructure, and alliances. Overall, the incident reinforces the importance of intelligence-driven defenses and continuous visibility in safeguarding critical infrastructure.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1078.001 Valid Accounts Default Accounts
Initial Access T1190 Exploit Public-Facing Application
Persistence T1136.001 Create Account Local Account
Persistence T1505.003 Server Software Component Web Shell
Defense Evasion T1562.001 Impair Defenses Disable or Modify Tools
Impact T1491.001 Defacement Internal Defacement
Impact T0831 Manipulation of Control

REFERENCES:

The following reports contain further technical details:
https://securityonline.info/pro-russian-hacktivist-group-twonet-exposed-for-fabricating-critical-infrastructure-attacks-to-boost-reputation/
https://www.forescout.com/blog/anatomy-of-a-hacktivist-attack-russian-aligned-group-targets-otics/

crossmenu