TwoNet as a Pro‑Russian Hacktivist / Threat Actor
Background & Emergence
TwoNet surfaced publicly in early 2025 as a new pro‑Russian hacktivist or cyber threat actor group. The Record from Recorded Future
The group operates in a style similar to other pro‑Kremlin hacktivist actors (for example, KillNet, NoName057(16), XakNet Team), using tactics such as DDoS attacks, website defacements, data leaks, and targeting critical infrastructure. The Record from Recorded Future+1
It is believed to have around 40 members involved in hacking, software development, and open‑source intelligence (OSINT) gathering. The Record from Recorded Future
Tactics & Recent Activity
DDoS & Defacements
Initially, TwoNet appeared to rely heavily on distributed denial-of-service (DDoS) operations and defacements of web services in countries aligned with Ukraine or Western interests. The Record from Recorded Future+1Pivot to Infrastructure & OT/ICS Attacks
Over time, TwoNet has expanded its ambitions. In 2025, it claimed to target critical infrastructure systems, including water treatment facilities (though incidents have sometimes been honeypots used by cybersecurity researchers to observe attacker behavior). BleepingComputer
In one observed case, after gaining initial access, the group manipulated human‑machine interface (HMI) layers, disabled logging and alarms, and altered setpoints in programmable logic controllers (PLCs). BleepingComputerPropaganda & Recruitment
TwoNet leverages Telegram channels (a common medium among hacktivist and cybercrime groups) to announce claimed hacks, release data, recruit insiders, and encourage targeting suggestions. The Record from Recorded Future
They have also claimed alliances with other pro‑Russian actors. X (formerly Twitter)+1
Risks & Implications
Blurring lines between hacktivism and cybercrime
TwoNet’s operations indicate a mixing of ideologically motivated hacking and financially or strategically motivated intrusion. Their public channels reportedly advertise services such as “hacker-for-hire,” ransomware-as-a-service, or initial access to industrial systems. BleepingComputerIncreased threat to critical infrastructure
Their shift toward operational technology (OT) and industrial control systems (ICS) engagement is particularly concerning, as these systems often have more severe consequences if disrupted (e.g. utility outages, physical damage). BleepingComputerTactical evolution & agility
TwoNet demonstrates that threat actors can pivot quickly — from DDoS / web attacks into deeper system compromise, reconnaissance, and control. This underscores that organizations must defend beyond just web infrastructure.
Hacktivist / Threat Actor Side
Will TwoNet increasingly target real infrastructure (power, water, transport) rather than primarily websites? Recent campaigns suggest yes. BleepingComputer
Will they develop more persistent, stealthy intrusion techniques beyond overt defacements and DDoS?
The possibility of alliances or mergers with other pro-Russian hacking groups may broaden their operational toolkit and geographic reach.