Blog Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS
Forescout honeypot caught hacktivist activity targeting a decoy water treatment plant in Sept. 2025. A Russian-aligned group, TwoNet, claimed responsibility for the attack. The group logged into the human-machine interface (HMI) for: defacement, process disruption, manipulation, and evasion.
AI Analysis
Technical Summary
The threat involves a hacktivist group known as TwoNet, aligned with Russian interests, conducting targeted attacks against OT and ICS environments, specifically water treatment facilities. The attack was observed in September 2025 via a Forescout honeypot designed to mimic a water treatment plant. TwoNet gained unauthorized access to the human-machine interface (HMI), a critical control point in OT systems, allowing them to perform defacement, disrupt processes, manipulate operations, and evade detection. The attack chain includes exploitation of vulnerabilities (MITRE ATT&CK T1190), lateral movement through remote services (T1021), use of valid credentials (T1078), network reconnaissance (T1016.001), exploitation of Modbus protocol weaknesses (T1210), and data manipulation or destruction (T1464). The group also uses ransomware-as-a-service (RAAS) tools such as MegaMedusa and Overflame, indicating potential for ransomware deployment in OT environments. IP indicators span multiple countries, including Russia, Iran, Germany, and France, reflecting a geographically dispersed infrastructure supporting the attack. Although no active exploits are publicly known, the attack demonstrates the increasing risk posed by hacktivist groups targeting critical infrastructure with sophisticated tactics. The medium severity rating reflects the potential for operational disruption and safety risks inherent in OT/ICS compromises.
Potential Impact
For European organizations, especially those managing critical infrastructure like water treatment plants, this threat poses significant risks. Unauthorized HMI access can lead to process disruptions, potentially causing water supply interruptions, contamination risks, or damage to physical equipment. Defacement and manipulation undermine trust in infrastructure integrity and can cause public safety concerns. The use of ransomware tools in OT environments could escalate the impact by encrypting critical control systems, leading to prolonged outages and costly recovery efforts. The presence of IP indicators from Germany and France suggests that attackers may already have footholds or are targeting entities within these countries. Disruption of water treatment services can have cascading effects on public health, industrial operations, and municipal services. Additionally, the attack highlights vulnerabilities in legacy protocols like Modbus, which are widely used in European OT systems. The medium severity rating indicates a tangible but not yet catastrophic threat, emphasizing the need for proactive defenses to prevent escalation.
Mitigation Recommendations
European OT/ICS operators should implement multi-layered security controls tailored to industrial environments. Specific recommendations include: 1) Enforce strict access controls and network segmentation to isolate HMIs and critical OT components from corporate and internet-facing networks. 2) Deploy robust authentication mechanisms, including multi-factor authentication (MFA), for all HMI and remote access points to prevent credential abuse. 3) Monitor and restrict Modbus and other legacy protocol traffic using deep packet inspection and anomaly detection tools to identify unauthorized commands or manipulations. 4) Conduct regular vulnerability assessments and patch management focused on OT-specific software and hardware, even if no direct patches exist, to reduce attack surface. 5) Implement continuous network monitoring with OT-aware intrusion detection systems (IDS) to detect reconnaissance and lateral movement activities. 6) Use honeypots or deception technologies to detect early-stage intrusions and gather intelligence on attacker tactics. 7) Develop and regularly test incident response plans specifically for OT/ICS scenarios, including ransomware recovery procedures. 8) Collaborate with national cybersecurity centers and share threat intelligence related to TwoNet and similar groups. 9) Restrict and monitor remote access channels, employing VPNs with strong encryption and logging. 10) Train OT personnel on social engineering and credential security to reduce risk of credential compromise. These measures go beyond generic advice by focusing on OT-specific protocols, access controls, and detection tailored to the tactics observed in this threat.
Affected Countries
Germany, France, Russia
Indicators of Compromise
- ip: 45.14.247.87
- ip: 92.43.161.74
- ip: 95.90.199.75
- ip: 2.181.103.232
- ip: 212.83.190.55
- ip: 45.157.234.199
- ip: 5.106.148.199
- ip: 77.91.122.234
- ip: 80.210.133.38
- ip: 87.150.146.207
Blog Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS
Description
Forescout honeypot caught hacktivist activity targeting a decoy water treatment plant in Sept. 2025. A Russian-aligned group, TwoNet, claimed responsibility for the attack. The group logged into the human-machine interface (HMI) for: defacement, process disruption, manipulation, and evasion.
AI-Powered Analysis
Technical Analysis
The threat involves a hacktivist group known as TwoNet, aligned with Russian interests, conducting targeted attacks against OT and ICS environments, specifically water treatment facilities. The attack was observed in September 2025 via a Forescout honeypot designed to mimic a water treatment plant. TwoNet gained unauthorized access to the human-machine interface (HMI), a critical control point in OT systems, allowing them to perform defacement, disrupt processes, manipulate operations, and evade detection. The attack chain includes exploitation of vulnerabilities (MITRE ATT&CK T1190), lateral movement through remote services (T1021), use of valid credentials (T1078), network reconnaissance (T1016.001), exploitation of Modbus protocol weaknesses (T1210), and data manipulation or destruction (T1464). The group also uses ransomware-as-a-service (RAAS) tools such as MegaMedusa and Overflame, indicating potential for ransomware deployment in OT environments. IP indicators span multiple countries, including Russia, Iran, Germany, and France, reflecting a geographically dispersed infrastructure supporting the attack. Although no active exploits are publicly known, the attack demonstrates the increasing risk posed by hacktivist groups targeting critical infrastructure with sophisticated tactics. The medium severity rating reflects the potential for operational disruption and safety risks inherent in OT/ICS compromises.
Potential Impact
For European organizations, especially those managing critical infrastructure like water treatment plants, this threat poses significant risks. Unauthorized HMI access can lead to process disruptions, potentially causing water supply interruptions, contamination risks, or damage to physical equipment. Defacement and manipulation undermine trust in infrastructure integrity and can cause public safety concerns. The use of ransomware tools in OT environments could escalate the impact by encrypting critical control systems, leading to prolonged outages and costly recovery efforts. The presence of IP indicators from Germany and France suggests that attackers may already have footholds or are targeting entities within these countries. Disruption of water treatment services can have cascading effects on public health, industrial operations, and municipal services. Additionally, the attack highlights vulnerabilities in legacy protocols like Modbus, which are widely used in European OT systems. The medium severity rating indicates a tangible but not yet catastrophic threat, emphasizing the need for proactive defenses to prevent escalation.
Mitigation Recommendations
European OT/ICS operators should implement multi-layered security controls tailored to industrial environments. Specific recommendations include: 1) Enforce strict access controls and network segmentation to isolate HMIs and critical OT components from corporate and internet-facing networks. 2) Deploy robust authentication mechanisms, including multi-factor authentication (MFA), for all HMI and remote access points to prevent credential abuse. 3) Monitor and restrict Modbus and other legacy protocol traffic using deep packet inspection and anomaly detection tools to identify unauthorized commands or manipulations. 4) Conduct regular vulnerability assessments and patch management focused on OT-specific software and hardware, even if no direct patches exist, to reduce attack surface. 5) Implement continuous network monitoring with OT-aware intrusion detection systems (IDS) to detect reconnaissance and lateral movement activities. 6) Use honeypots or deception technologies to detect early-stage intrusions and gather intelligence on attacker tactics. 7) Develop and regularly test incident response plans specifically for OT/ICS scenarios, including ransomware recovery procedures. 8) Collaborate with national cybersecurity centers and share threat intelligence related to TwoNet and similar groups. 9) Restrict and monitor remote access channels, employing VPNs with strong encryption and logging. 10) Train OT personnel on social engineering and credential security to reduce risk of credential compromise. These measures go beyond generic advice by focusing on OT-specific protocols, access controls, and detection tailored to the tactics observed in this threat.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.forescout.com/blog/anatomy-of-a-hacktivist-attack-russian-aligned-group-targets-otics/"]
- Adversary
- TwoNet
- Pulse Id
- 68e93aa69b891f05e0cc0c7a
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip45.14.247.87 | CC=RU ASN=AS61390 garant-g ltd. | |
ip92.43.161.74 | CC=IR ASN=AS58224 iran telecommunication company pjs | |
ip95.90.199.75 | CC=DE ASN=AS3209 vodafone gmbh | |
ip2.181.103.232 | CC=IR ASN=AS58224 iran telecommunication company pjs | |
ip212.83.190.55 | CC=FR ASN=AS12876 online s.a.s. | |
ip45.157.234.199 | CC=DE ASN=AS58212 php-friends gmbh | |
ip5.106.148.199 | CC=IR ASN=AS197207 mobile communication company of iran plc | |
ip77.91.122.234 | CC=RU ASN=ASNone | |
ip80.210.133.38 | CC=IR ASN=AS58224 iran telecommunication company pjs | |
ip87.150.146.207 | CC=DE ASN=AS3320 deutsche telekom ag |
Threat ID: 68e93e03811be5ca96d13cc9
Added to database: 10/10/2025, 5:10:27 PM
Last enriched: 10/10/2025, 5:26:23 PM
Last updated: 11/24/2025, 6:08:59 PM
Views: 290
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Shai Hulud npm Worm Impacts 26,000+ Repos in Supply Chain Attack Including Zapier, ENS and Postman
MediumShai Hulud npm Worm Infects 19,000 Packages in Major Supply Chain Attack
Medium⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
MediumFake Prettier Extension on VSCode Marketplace Dropped Anivia Stealer
MediumKimsuky's Ongoing Evolution of KimJongRAT and Expanding Threats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.