Pro-Russian Hacktivist Groups Targeting the Aviation Sector in 2024: A Study of Telegram Channel Communications
- Tech Man
- Jul 16, 2024
- 11 min read
Updated: Dec 26, 2024

Introduction
The ongoing conflict in Ukraine has ignited a surge in hacktivist activity, with pro-Russian groups targeting Ukrainian entities and their allies across various sectors. While the peak of pro-Russian hacktivism was observed in 2023, a steady stream of malicious activities persists. Established groups like Killnet, NoName057(16), Anonymous Russia, Phoenix, and the People's Cyber Army continue to evolve, adopting new structures and expanding their arsenals. Additionally, new pro-Russian factions like Killnet2.0 and JUST EVIL have emerged, further diversifying the threat landscape.
This resurgence of hacktivism, characterized by increased capabilities and wider-reaching impacts, underscores the need for a proactive cybersecurity approach. Hacktivists, motivated by political ideologies, social activism, or financial gain, leverage a range of tactics, from DDoS attacks and website defacements to sophisticated network intrusions and information operations. Their ability to remain anonymous and their diverse objectives make them attractive to both state and non-state actors, amplifying their potential for disruption.
In the face of this evolving threat, proactive monitoring of hacktivist communications on platforms like Telegram has emerged as a critical tool for defenders. By analyzing the discourse, identifying emerging trends, and understanding the motivations behind these attacks, cybersecurity professionals can anticipate threats and implement preemptive measures. The aviation industry, with its reliance on interconnected digital systems, is particularly vulnerable to these attacks. Therefore, this article will explore the use of Telegram channel monitoring as a proactive cybersecurity measure to understand and pre-empt cyber threats from pro-Russian hacktivist groups targeting the aviation sector.
Methodology
To investigate the threat landscape posed by pro-Russian hacktivist groups towards the aviation industry, a systematic data collection and analysis process was employed. The core of this methodology involved the development of a custom Python script designed to monitor public Telegram channels associated with 22 known Russia-linked hacking collectives, curated through open-source research.
The script, leveraging the Telethon library for Telegram API interaction, conducted targeted keyword searches within these channels. Recognizing the language barrier, a curated list of relevant aviation-related keywords (e.g., "aviation," "airport," "airline," "aerospace") was translated into Russian to ensure comprehensive data capture. Upon encountering a keyword match within a message, the script extracted pertinent information, including the message date, content, and any mentioned URLs of allegedly attacked websites. This data was then organized into a structured dataframe for subsequent analysis.
Given the unstructured nature of Telegram messages, the text data from the content column of the dataframe was aggregated for processing by a generative AI model. Specifically, Gemini 1.5 Pro, the latest publicly available model in the Gemini family of generative AI models from Google AI, was chosen for its advanced capabilities in natural language understanding and text summarization. The model was prompted with the following instruction: "Help me to analyze the following Telegram messages and summarize into hacktivist groups involved, list of all organizations with associated countries in bracket and dates in square bracket, motives and tactics - {collapsed text}." The generated summary (Img1), providing a concise overview of the hacktivist landscape, was then output to a .txt file for further human review and interpretation.

Img1. Analysis summary from Gemini GenAI
Through this approach, the monitoring of 22 Russia-linked hacking groups' Telegram channels revealed that seven pro-Russian hacktivist groups had claimed cyber attacks against aviation entities in their public channels throughout 2024.
In addition to the script for data collection and analysis, a separate Python script was developed to monitor the Telegram channels of the identified pro-Russian hacktivist groups in real-time. This script, also utilizing the Telethon library, periodically checks for new messages in these channels. Upon detecting a new message, the script extracts relevant information and posts a notification via Telegram bot (telebot) to a designated Telegram channel used for monitoring purposes (Img2). This real-time monitoring capability allows for immediate awareness of new threats and potential attacks, enabling a more proactive and timely response from cybersecurity professionals.

Img2. Telegram Monitoring
Analysis
The analysis of the messages from the seven pro-Russian hacktivist groups' public telegram channels reveals a sustained campaign by pro-Russian hacktivist groups targeting the aviation sector in 2024, with numerous claimed attacks (Refer to Annex for details). The EMEA region (Chart1), particularly Italy, has been the primary focus of these attacks, with airports (Chart3) being the most frequently targeted entities. While the attacks began in January and have persisted throughout the year, their frequency has varied. This overview underscores the ongoing threat posed by these groups to the aviation industry, particularly in the EMEA region and at airports.
These hacktivist groups are primarily motivated by retaliation for perceived anti-Russian sentiment and actions, and opposition to Western foreign policy and NATO. Their tactics include Distributed Denial of Service (DDoS) attacks, information warfare, website defacement, data breaches, and collaboration with other groups. These attacks not only aim to cause operational disruptions and financial damage but also serve as a platform for spreading propaganda and intimidating targets. The diverse motives and evolving tactics of these groups highlight the complexity of the threat they pose to the aviation industry and the broader geopolitical landscape.
Chart1. Targeted Region
Chart2. Targeted Country
Chart3. Targeted Aviation Entity
Mitigation and Preparedness
The persistent and evolving threat posed by pro-Russian hacktivist groups necessitates a multi-faceted approach to mitigation and preparedness in the aviation sector:
Enhanced Cybersecurity Measures: Implementing robust cybersecurity measures is paramount. This includes regular security audits, vulnerability assessments, and penetration testing to identify and address weaknesses in systems and networks.
Real-Time Threat Intelligence: Proactive monitoring of hacktivist communications on platforms like Telegram, as demonstrated in this study, can provide valuable threat intelligence. This allows for early detection of potential attacks and enables preemptive action.
Incident Response Planning: Developing and regularly testing incident response plans is crucial. These plans should outline procedures for responding to cyberattacks, minimizing damage, and ensuring business continuity.
Employee Training and Awareness: Educating employees about cybersecurity risks and best practices is essential. This includes training on identifying phishing attempts, social engineering tactics, and other common attack vectors.
Collaboration and Information Sharing: Collaboration between aviation entities, cybersecurity firms, and government agencies is vital. Sharing threat intelligence and best practices can enhance the overall resilience of the aviation sector.
By adopting a proactive and comprehensive approach to cybersecurity, the aviation industry can better mitigate the risks posed by pro-Russian hacktivist groups and ensure the safety and security of its operations.
Conclusion
The ongoing cyber conflict in Ukraine has spurred a surge in pro-Russian hacktivist activities, posing a significant and evolving threat to the aviation sector. These groups, motivated by a complex interplay of political ideologies, retaliatory impulses, and financial incentives, have demonstrated a growing sophistication in their tactics and a widening impact on their targets. The analysis of their communications on platforms like Telegram reveals a sustained campaign against the aviation industry, particularly targeting the EMEA region and airports.
The diverse motives and evolving tactics of these groups underscore the complexity of the threat they pose. Their actions are not merely disruptive but also serve as a platform for spreading propaganda, intimidating targets, and influencing the broader geopolitical landscape. This necessitates a proactive and multi-faceted approach to cybersecurity in the aviation sector.
By enhancing cybersecurity measures, leveraging real-time threat intelligence, developing robust incident response plans, and fostering collaboration and information sharing, the aviation industry can better mitigate these risks. Additionally, educating employees about cybersecurity threats and best practices is crucial in building a resilient defense against these attacks.
The findings of this study emphasize the importance of continuous monitoring and analysis of hacktivist communications as a proactive cybersecurity measure. By understanding the motivations, tactics, and targets of these groups, the aviation industry can anticipate threats, implement preemptive measures, and ensure the safety and security of its operations in the face of this evolving cyber threat landscape.
Annex
Due to the sensitivity of the information and to protect the privacy of the organizations involved, the names of the hacktivist groups are not shown and the names of the organizations targeted have been redacted.
Hacktivist Group 1
Hacktivist Group 2
Hacktivist Group 3
Hacktivist Group 4
Hacktivist Group 5
Hacktivist Group 6
Hacktivist Group 7
References
[1] NJCCIC: (https://www.cyber.nj.gov/Home/Components/News/News/1292/214).
[2] CyberScoop: (https://cyberscoop.com/sandworm-apt44-texas-water-facility/).
[3] S-RM: (https://www.s-rminform.com/cyber-intelligence-briefing/cyber-intelligence-briefing-26-april-2024).
[4] Embassy of Ukraine to the Republic of Slovenia: (https://slovenia.mfa.gov.ua/en/news/russian-group-cyber-army-russia-reborn-announced-cyber-attacks-critical-infrastructure-slovenia-due-position-countrys-government-regarding-support-ukraine).
[5] Security Solutions Media: (https://www.securitysolutionsmedia.com/2024/06/19/uncovering-the-hacktivist-cyberattacks-targeting-the-eu-election/).
[6] Daily Mail: (https://www.dailymail.co.uk/sciencetech/article-13119541/att-hack-russian-post-event-victim-claiming.html).
[7] KELA Cyber Threat Intelligence: (https://www.kelacyber.com/russia-ukraine-war-pro-russian-hacktivist-activity-two-years-on/).
[8] SOCRadar: (https://socradar.io/dark-peep-10-the-cold-of-russia-2-0/).
[9] The Cyber Express: (https://thecyberexpress.com/killnet-2-0-and-sylhet-gang-hackers/).
[10] DFRLab: (https://medium.com/dfrlab/russia-aligned-hacktivists-stir-up-anti-ukrainian-sentiments-in-poland-f2d6660cf09a).






Comments