Who Is Dark Storm? The Threat Actor European Security Teams Can’t Ignore

Who Is Dark Storm? A Pro-Russian Collective Expanding Its Reach
The threat actor Dark Storm, also known as Dark Storm Team, TeamDarkStorm, and MRHELL112, has built a reputation for hitting critical infrastructure, particularly airports and transportation networks. While DDoS has remained its signature method, the group has recently broadened its campaigns to include political, opportunistic, and retaliatory attacks. Dark Storm is part of the pro-Russian alliance Matryoshka 424, connecting it to other hacktivist clusters that coordinate messaging, tools, and attack timing. The group’s alignment with wider pro-Russian cyber movements has amplified its operational impact, especially during geopolitical flashpoints.Growing Web of Alliances Boosts Their Disruptive Capabilities
The threat actor’s tactic frequently overlaps with those of linked groups such as OverFlame, Server Killers, Z-Pentest, and Team BD Cyber Ninja, all of which share DDoS infrastructure and ideological motivations.- OverFlame focuses on attacks connected to Ukraine and its allies.
- Server Killers routinely targets entities perceived as opposing Russian interests.
- Z-Pentest, a newer group, has been seen exploiting unauthorized access to ICS panels and performing website defacements.
How Dark Storm Executes Its Attacks
1. Exploiting Public-Facing Applications
Dark Storm’s operations often begin with exploiting weaknesses in internet-facing applications, including misconfigured servers, outdated services, and vulnerable web components. By leveraging Initial Access techniques such as exploiting public-facing apps (T1190), the group aims to identify high-value entry points. This includes:- Web servers and cloud-hosted applications
- Administrative interfaces
- Exposed databases or misconfigured network devices
- Voluminous traffic generation using botnets
- IP spoofing to hide origin
- Reflective amplification techniques
- Multi-layer targeting of network and application endpoints
- Flooding official portals
- Disrupting public-facing service websites
- Interrupting online citizen services
- Targeting digital communication channels