Tom Hegel Profile picture
Oct 15 18 tweets 4 min read Read on X
1/ A pro-Hamas persona is making noise from recent airport “hacks”, including broadcast system defacements in 🇨🇦 Kelowna & 🇺🇸 Harrisburg.

But digging deeper, their actions remain low-impact and opportunistic. Lets take a deeper look..🧵
2/ Their “operations” rely on publicly exposed CMS, display, and PA systems, seemingly no exploits, no malware, just abused public services which may lack proper authentication controls. The targets are selected for visibility and attention, not strategic value.
3/ The timeline begins in August 2025, with Turkish website defacements, later spreading to Israeli domains. Claims of website “takedowns” followed, though all were short-lived and often quickly restored.
4/ By September, they aimed at digital signage systems, such as some public billboards in Peru, and fast-food menus in Turkey, the U.S., and Israel. These are soft targets with dramatic optics but zero real operational impact. Several were major Western brands operating in TR/IL. Image
Image
4.25/ They had a limited case of "hacking a TV station". Looks like it was a news station in Nigeria exposing their broadcast platform system online. Image
4.5/ Note, some limited personal contact info leaking and claims of calling Govt. officials (IL/TY), but unable to verify authenticity of those calls. However sources appear to simply be, again, exposed CMS systems with customer details. Examples: Image
Image
5/ This week’s incidents at Canada's Kelowna International Airport (@ylwkelowna) and Harrisburg International Airport (PA, USA - @FlyHIA) elevated the group’s visibility.
6/ In both cases, the actor accessed announcement systems, broadcasting pro-Hamas messages on par with their usual message. The only signage I see impacted are from the individual airline checkin counters in CA.

(audio: ) Image
7/ These are not aviation security breaches, they’re public-facing system compromises, embarrassing but short-lived. Outsider hot take: only a disruption of commercial comms, not operations. (Flights were temporarily delayed, and airport staff reverted to manual announcements.)
8/ Now, who’s behind it?

Our analysis suggests this persona is likely a single individual, not a coordinated collective. Their style, cadence, and digital footprint indicate one operator maintaining multiple social media channels.
9/ They’re active across Telegram and Twitter/X, posting defacement screenshots and recycling imagery from real Hamas propaganda to amplify credibility.
9.5/ Fun.. in some google search hype vids they post online, their default browser language is Turkish, and using Microsoft Edge browser. Other cases its Chrome in Turkish, but local German ads. VPN be poppin'
10/ Notably, the persona repeatedly uses Abu Obaida’s headshot, the masked spokesperson of Hamas’ military wing, despite the fact that the real Abu Obaida was reported killed in August. Image
11/ This tactic of reusing authentic wartime media is common among low-skill influence actors. It’s a way to borrow legitimacy from real conflict footage and inflate perceived alignment with larger operations.
12/ From an analytical perspective, this persona fits the mold of ideologically motivated but technically shallow hacktivists.. Prioritizing message reach and emotional impact over actual intrusion capability.
13/ It’s also worth noting: this exact pattern of “hacktivist” behavior... opportunistic website defacements, Telegram propaganda, and recycled imagery, has historically been used by Western individuals and as a cover for Iranian state-sponsored actors.
14/ Current assessment (based on VIBESINT™):
👉 Likely a single ideological actor
👉 Not directly coordinated with Hamas or a state entity
👉 Motivated by identity, attention, and perceived alignment with global conflict narratives
15/ Bottom line atm:

- Opportunistic, low-impact activity
- Heavy on propaganda, questionable on skill
- Visibility ≠ capability

A reminder that not all “cyber warfare” headlines represent capable adversaries. Sometimes, they’re just one person with a vpn, kali and a message.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Tom Hegel

Tom Hegel Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @TomHegel

Sep 5, 2024
Can't help myself.. Taking a look into some of these 32 domains sheds light on a few unmentioned Doppelganger domains still active and personas posting on Twitter. Quick 🧵
lebelligerant[.]io
Twitter Account: @lebelligerant
Image 1 - Homepage.
Image 2 - Translated Main Article.
Image 3 - Fresh tweets.
Note: The webmail subdomain mistakenly uses the 50statesoflie[.]media domain content, which was listed in the Doppelgange raffidavit.

Image
Image
Image
interventionist[.]cc
Twitter Account: @Intrvntnst
Image 1 - Homepage.
Image 2 - Translated Main Article.
Image 3 - Fresh tweets.
Note: Same as above, multiple subdomains. First active around one month ago.

Image
Image
Image
Read 9 tweets
Mar 25, 2024
I often get asked what tools I use for various aspects of threat research / analysis --

Here's a quick list of my favorites that most are not taking advantage of.. 🧵
1. Aeon Timeline (@AeonTimeline):
▪️ This is my replacement for most Maltigo-style mapping + time-lining chaotic events.
▪️ Everything I investigate starts with one of these to track pivots/clues.
▪️ $65 a year..

More about how I use it here: sentinelone.com/labs/putting-t…
This is outdated as hell, don't @me
2. Validin (@ValidinLLC):
▪️ DNS History, infra pivots, timeline of use, host response searching, OSINT references, etc.
▪️ Quickly developing from great analyst feedback.
▪️ $ Free Community Version!

🔥 An upgraded and affordable passivetotal replacement. Validin Timeline View
Read 6 tweets
Jul 20, 2023
💜 JumpCloud Intrusion | Attacker Infrastructure Links Compromise to North Korean APT Activity

I took a look into the IOCs shared by @JumpCloud and found links to APT Infrastructure we attribute to DPRK.

Quick 🧵..

#threatintelsentinelone.com/labs/jumpcloud…
Look how 144.217.92[.]197 is being used by npmaudit[.]com -- this domain links to @github's recent security alert. Nice!

Based on timing of this, I'm going to assume its related to the JumpCloud intrusion but thats just my outsider perspective here.

github.blog/2023-07-18-sec…
This then leads us further back to a lesser known report from @Phylum_IO's research team. About a month ago they published details on an ongoing NPM campaign.

We can quickly see infrastructure overlaps with the JumpCloud + GitHub findings. 🌶️

blog.phylum.io/author/phylum-…
Read 5 tweets
Mar 22, 2022
Today CERT-UA released two new posts on recent attacks on Ukraine Gov and enterprises.

- UAC-0026 Delivering HeaderTip.
cert.gov.ua/article/38097

- UAC-0088 Attacks with DoubleZero Wiper.
cert.gov.ua/article/38088

Follow along for a quick thread:
🧵1/x
@AeonTimeline 2/x: (threads are hard, sorry)

First lets look at UAC-0026:

Some (including me at first) are associating this with Symantec 2015's post on "Scarab", who was active since 2012.

At the time they were known to target a very small amount of individuals of interest (see map)
@AeonTimeline 3/x:

Here is Symantecs old blog: web.archive.org/web/2015012402…

Unfortunately the IOC file is no longer hosted there. Luckily our friends at AT&T (Alienvault OTX) pulled the IOCs back when that blog was posted: otx.alienvault.com/pulse/54c7e1e8…
Read 20 tweets
Feb 10, 2022
Today we published a new report on the new ModifiedElephant APT, and the years of attacks against groups and individuals in India.

Blog: s1.ai/m-elephant
Full Report: s1.ai/mod-elephant

Quick 🧵 on some highlights:
ME is responsible for targeted attacks on human rights activists, human rights defenders, academics, and lawyers across India with the objective of planting incriminating digital evidence.
Targets and known victims include those involved in the Bhima Koregaon case, in which the evidence presented in the case was planted by the actor prior to arrests.
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(