Graphika researchers have tracked almost 700 active and dormant hacktivist groups since 2022 in a thorough investigation using the ATLAS intelligence platform, exposing a complex and dynamic online ecosystem.
These groups encompass a wide spectrum of actors, including state-sponsored personas, pro-Russia and pro-Ukraine entities, and hacktivists rooted in regions across the Middle East, North Africa, and South and Southeast Asia.
Publicity as a Tool
Hacktivist operations are increasingly characterized by a deliberate focus on high-profile targets such as financial institutions, social media platforms, and government agencies.
The selection of these targets is often driven by the groups’ underlying ideological or political motivations and a strategic calculus to maximize public exposure.
Promotion is central to hacktivist strategy. By deploying dedicated hashtags, unique logos, and orchestrating social media campaigns, these actors seek to amplify their exploits and boost recognition within both the cybersecurity community and mainstream audiences.
Attention in the press becomes a force multiplier, with hacktivists frequently celebrating media coverage that references their attacks or claims, regardless of direct attribution or factual accuracy.
Perception Hacking
A notable tactic identified by researchers is “perception hacking,” in which groups make unsubstantiated claims about penetrating high-value targets or causing significant operational disruptions.
According to Graphika Report, this information operation aims to inflate the group’s public profile and instill the impression that their adversaries, often well-defended organizations, are inherently vulnerable.
Such perception hacking, even absent concrete technical success, can erode confidence in corporate and governmental security and attract new recruits to the group’s cause.
The report highlights a marked trend: hacktivist communities are increasingly focused on developing novel, disruptive capabilities.
This evolution in technical sophistication indicates a trajectory toward more complex and impactful operations, escalating the overall level of threat posed by hacktivist networks and signaling likely growth in attack frequency and severity over time.
Alongside publicity campaigns, many hacktivist groups actively monetize their notoriety. This is often achieved by leveraging their elevated profile to promote the sale of hacking tools, both externally sourced and internally developed, as well as offering paid hacking services and training courses.
The intersection of criminal entrepreneurship and cyber-activism blurs traditional boundaries between hacktivism and cybercrime.
The internal structure of hacktivist communities is notably fluid. Highly public and active members frequently guide the direction of campaigns, publicly designating targets and rallying participants around coordinated efforts.
Strategic alliances between like-minded groups can amplify operations and claims, maximizing impact.
However, rivalries and intra-community feuds are also a hallmark of the landscape, with factions occasionally turning their attention against one another to generate additional content and reinforce their online brands.
Telegram remains the primary hub for hacktivist activity due to its relative privacy and permissive content policies.
However, operators also maintain a persistent presence on mainstream platforms such as Facebook, Instagram, and X.
Recent escalations in platform moderation and content takedowns have forced many groups to adopt adaptive behaviors: some frequently switch usernames or handles to avoid detection, while others enter periods of public inactivity before resurfacing as threats re-emerge.
This shifting environment underscores the persistent challenge organizations face in defending against increasingly agile and media-savvy adversaries who blend cyber-disruption with high-impact propaganda at a global scale.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant updates