Deathnote Hackers (DNH): A Brief Overview

 (2015-2016) Old group banner

Deathnote Hackers (DNH) is a Manila-based Greyhat hacking group founded in 2016 by TATAY45, initially starting as a hacking tutorial page before evolving into a full-fledged hacking collective. TATAY45, after gaining expertise in unethical hacking, programming, and SEO, was inspired by the international hacking group "Lulzsec" and their Operation CODE:51, which focused on leaking sensitive information. This inspired TATAY45 to launch his own operation, also called CODE:51, targeting the release of leaked source codes. However, facing challenges while operating alone, TATAY45 expanded his efforts by recruiting members skilled in penetration testing, programming, and cybersecurity.

This led to the formation of Deathnote Hackers. By mid-2016, the group had grown, with members from other hacking communities like Unirises, ZyberPh Developers, DeepWeb FAKK, and representatives from Anonymous. Notorious for their cyberattacks, DNH gained significant attention after executing a Distributed Denial of Service (DDoS) attack on Dragon Nest SEA, a game owned by Eyedentity Games, in 2015. They also unleashed a ransomware attack in 2017 that targeted public forums, with BleepingComputer first detecting it in the wild. Under the leadership of Klammer, who joined in late 2016 and took over after TATAY45's retirement, DNH expanded its operations.

In 2022, DNH actively participated in the Russia-Ukraine cyber conflict, supporting Ukraine by disrupting Russian cyberattacks and defending critical infrastructure. Collaborating with members like "LiteMods" from the United States, the group also engaged in various operations around the world, including in #OPJapan and #OPSenegal. Today, DeathNote Hackers continues to be a prominent and highly active group, blending hacktivism with skilled cyber operations.

Learn about their past and recent cyber operations down below