
Category | Assessment |
Actor | Handala Hack Team |
Attribution | Iranian MOIS-linked Void Manticore - aka Cobalt Mystique, Banished Kitten, Storm-0842, Dune, Karma, Homeland Justice |
Activity level | Highly active - 85+ attacks documented (Feb 2024-Feb 2025); escalating in 2025-2026 |
Primary goal | Political disruption and psychological warfare; state-directed destruction |
Key capability | Destructive wiping,hack-and-leak operations, cloud management weaponization, infostealer campaigns |
Critical development | Weaponization of enterprise cloud management tools (MDM/SaaS) - Microsoft Intune remote wipe |
Significant incidents | Stryker Corporation - 11 March 2026; Soreq Nuclear Center - Sept 2024; Israeli National Police - Feb 2025; Iran international journalists -July 2025 |
Sectors targeted | Healthcare/MedTech, Government/Defense, IT, Energy, Telecoms, Media, Education |
Geographies | Israel (primary), USA, Canada, Albania |
Persona | Primary Targets | Key Operations |
Handala Hack Team | Israel, USA, Canada, global | Stryker wipe (2026), Soreq Nuclear (2024), Police breach (2025), journalist targeting (2025) |
Homeland Justice | Albania | E-government disruption via CVE-2019-0604 (SharePoint); CL Wiper, No-Justice Wiper deployment (2022–2023) |
Karma | Israel | Precursor Israel-focused destructive operations; BiBi Wiper deployment |
APT Group / Alias | Relationship to Void Manticore / Handala |
APT34 / OilRig / Helix Kitten (MOIS) | Primary partner: Scarred Manticore sub-unit provides initial access; Void Manticore executes destruction |
APT33 / Elfin / Refined Kitten (IRGC) | Shared wiper tooling lineage (Shamoon); aerospace and energy sector targeting overlap |
APT35 / Charming Kitten / Phosphorus (IRGC) | Parallel phishing and journalist-targeting operations; credential theft focus |
APT39 / Chafer / Radio Serpens (MOIS) | MOIS sibling group; telecom and travel targeting; documented infrastructure overlap |
MuddyWater / Mango Sandstorm (MOIS) | Shared tools: FRP, Empire, LaZagne; government and telecom sector focus |
Date | Incident | Claimed Impact | Sector |
Late 2023 | Public persona emerges; initial leak operations | Psychological impact; data leaks | Government, IT |
Sep 2024 | Soreq Nuclear Research Center breach (Israel) | Classified nuclear project data exfiltrated | Government / Defense |
Feb 2025 | Israeli National Police breach | Personnel records, weapons inventories, psychological profiles | Law Enforcement |
Jun 2025 | Operation Rising Lion | Critical infrastructure disruption campaign | Energy, Government |
Jul 8, 2025 | Iran International journalist targeting | 5 journalists targeted including Canadian; digital transnational repression | Media / Journalism |
Mar 11, 2026 | Stryker Corporation (USA) — SEC 8-K confirmed | Systems wiped, data exfiltrated (claimed), global disruption | Healthcare / MedTech |
Technique | Description |
Group Policy / GPO logon scripts | Wiper binaries distributed to all domain machines simultaneously via GPO; executed through scheduled tasks and logon scripts |
VeraCrypt encryption | Legitimate VeraCrypt tool downloaded directly from official site; used to encrypt system drives destructively |
Manual VM/file deletion | Operators manually log into hypervisor platforms and delete virtual machines or files directly — no malware artifact |
Microsoft Intune remote wipe | Privileged MDM commands issued at scale to wipe all enrolled devices globally (Stryker, 2026) |
MBR-based wiping | Handala Wiper overwrites Master Boot Record in addition to file contents, preventing OS recovery |
Tool | Description |
Handala Wiper | Custom wiper distributed via Group Policy logon scripts and scheduled tasks; overwrites file contents and uses MBR-based wiping techniques, preventing system restoration. Deployed in Israeli-targeted intrusions. |
Handala PowerShell Wiper | Secondary destructive component delivered through GPO logon scripts; recursively deletes files in user directories and drops a propaganda image. Code analysis by Check Point suggests likely AI-assisted development — enabling rapid variant creation. |
BiBi Wiper (Windows/Linux) | 203 KB x64 PE (compiled Oct 2023); runs 12 threads on 8-core systems for maximum destruction speed; renames destroyed files to .BiBi extension; deletes shadow copies and disables Windows Recovery mode. Attributed to Void Manticore. Linux variant also available. |
Tool | Description |
CL Wiper | Destructive wiper deployed in Albania / Homeland Justice operations (CISA documented) |
No-Justice Wiper / LowEraser | Used in Albania campaigns attributed to the same MOIS cluster (ClearSky research) |
GoXml.exe / ROADSWEEP encryptor | Destructive encryptor used in the Albania chain tied to Homeland Justice; documented by Google and CISA/FBI |
ZeroCleare-linked components | Albania wiper used EldoS RawDisk licensing element from ZeroCleare — demonstrating shared destructive tooling lineage across this Iranian cluster (Microsoft) |
Tool | Function |
Rhadamanthys infostealer | Recorded Future and Operation Endgame/Shadowserver data indicate use of this commercial MaaS stealer by Handala in phishing campaigns impersonating Israeli cyber authorities (Check Point, 2026). Capabilities include browser credential theft, cryptocurrency wallet seed phrase extraction via AI OCR (v0.7.0+), and PNG steganography delivery. Law enforcement disrupted Rhadamanthys infrastructure (Operation Endgame, Nov 2025) with 525,000+ infections documented across 226 countries. |
RedAlert APK | Malicious Android clone of Israeli emergency alert app used for data exfiltration from mobile devices |
SHA256 (truncated) | Type | Filename | Source |
fe07dca68f...77e30bd2 | Windows PE (.NET) | F5UPDATER.exe | Cyberint |
ca9bf13897...d0d74a | Windows PE (.NET) | F5UPDATER.exe (variant) | Cyberint |
e28085e8d6...83af35 | Windows PE (.NET) | Hatef.exe | Cyberint |
454e6d3782...f9567 | Windows PE (Delphi) | Handala.exe | Cyberint |
6f79c0e0e1...840ad | Encrypted bash script | update.sh | Cyberint |
f58d3a4b2f...bd3 | AutoIt Interpreter | Naples.pif | Cyberint |
aae98974...8acd4 | Obfuscated AutoIt Script | (unnamed) | Cyberint |
Sector | Context and examples |
Healthcare / Medical Devices | Stryker Corporation (2026) is the most destructive example. Operational disruption directly impacts patient care globally. |
Government & Defense | Soreq Nuclear Research Center (Sep 2024); Israeli National Police (Feb 2025); ministry and agency targeting. |
Information Technology | IT and managed service providers targeted as supply-chain footholds into downstream victim networks. |
Energy & Oil/Gas | Strategic economic targeting; ICS/SCADA system exposure exploited |
Telecommunications | Infrastructure criticality; lateral movement enablement; APT39 handoff operations. |
Financial Services / Banking | Economic disruption; credential and data theft for secondary operations. |
Media & Journalism | Digital transnational repression: Iran International journalists (Jul 2025), CPJ documented. Suppression of Iran-critical reporting. |
Education & Academia | Intelligence gathering and research theft |
Transportation & Manufacturing | Operational disruption via Stryker Cork manufacturing facility; orthopedic supply chain impact. |
MITRE tactic | Technique & ID | Description |
Initial Access | Valid Accounts (T1078) | Compromised VPN credentials; privileged cloud account (Intune/Azure) takeover |
Initial Access | Exploit Public-Facing App (T1190) | SharePoint CVE-2019-0604 (Albania); supply-chain IT provider footholds |
Initial Access | Spearphishing (T1566) | Vendor impersonation emails; Rhadamanthys delivery impersonating Israeli cyber authorities |
Execution | Command Shell (T1059.001) | PowerShell wiper scripts, ADRecon (dra.ps1), AutoIt & batch scripts |
Execution | WMIC (T1047) | Remote process creation and command execution across victim networks |
Persistence | Web Shell (T1505.003) | reGeorge webshell deployed on compromised internet-facing servers |
Credential Access | LSASS Memory Dump (T1003.001) | comsvcs.dll/rundll32 and Mimikatz for credential extraction |
Discovery | Account Discovery (T1087) | ADRecon (dra.ps1), AD Explorer, Advanced Port Scanner |
Lateral Movement | Remote Desktop Protocol (T1021.001) | Primary hands-on lateral movement vector — documented in all Handala intrusions |
Lateral Movement | SMB / Admin Shares (T1021.002) | Lateral movement via SMB alongside FTP and custom tunneling |
Collection & Exfil | Cloud Storage (T1567 / T1537) | Data staged to Storj, Vultr/Vultrobjects, AWS S3-compatible APIs |
Exfiltration | Application Layer Protocol (T1071.001) | Telegram API bots and HTTP C2 for data exfiltration and command signaling |
Defense Evasion | Obfuscation (T1027) | Script-based payload masking; AutoIt interpreter obfuscation; custom VM-based Rhadamanthys packing |
Impact | Data Destruction (T1485) | Handala Wiper, BiBi Wiper, CL Wiper - permanent file/MBR destruction |
Impact | Inhibit System Recovery (T1490) | Shadow copy deletion; Windows Recovery mode disabled |
Impact | Data Encrypted for Impact (T1486) | VeraCrypt used destructively; GoXml.exe/ROADSWEEP encryptor |
Impact | System Shutdown / Reboot (T1529) | MBR-based wipe preventing OS recovery; VM deletion; Intune remote wipe (Stryker) |
Indicator | Type / Notes |
107.189.19.52 | Dedicated C2 server — actor retrieved additional payload from this IP during documented intrusion (Check Point) |
82.25.35.25 | Handala VPS (Check Point Research) |
31.57.35.223 | Handala VPS (Check Point Research) |
IP Range | Notes |
169.150.227.X | Commercial VPN range used by Handala operators (Check Point Research) |
149.88.26.X | Commercial VPN IP range (Check Point Research) |
146.185.219.235 | VPN exit node used by Handala (Check Point Research) |
188.92.255.X | Starlink-backed IP range — used during Iranian internet blackout (Check Point, Iran International) |
209.198.131.X | Starlink-backed IP range (Check Point Research) |
Indicator | Type / Notes |
sjc1.vultrobjects.com/f5update/update.sh | Vultr-hosted malware delivery URL (Cyberint IOC) |
Storj cloud storage | Data exfiltration destination (OP Innovate) |
Vultr / Vultrobjects | Cloud hosting for payloads and exfiltrated data (OP Innovate, Cyberint) |
AWS S3-compatible APIs (botocore/boto3) | Cloud object storage used for exfiltration — S3 upload logic found in malware (OP Innovate) |
api[.]ra-backup[.]com | Domain indicator associated with Handala C2 infrastructure |
Telegram API / bots | Data exfiltration and C2 channel; public Handala Telegram channels used for leak publication |
Hostname Pattern | Context |
WIN-P1B7V100IIS | Attacker-controlled Windows host observed in Handala intrusions |
DESKTOP-FK1NPHF | Attacker-controlled host fingerprint |
DESKTOP-R1FMLQP | Attacker-controlled host fingerprint |
VULTR-GUEST | Vultr VPS default hostname — indicates cloud-hosted attacker workstation |
Weakness | Details |
Identity over-privilege | Highly privileged cloud admin accounts - Intune, Azure, Entra ID - that are not protected by phishing-resistant MFA (FIDO2). A single compromised admin credential can trigger global device resets. |
Lack of guardrails on MDM commands | Many platforms allow a single administrator to execute large-scale remote wipe commands by default. Without multi-user approval (MUA) requirements, a single compromised account becomes a global wipe button. |
MDM blind spots in SOC monitoring | Most SOCs monitor for 'malware alerts' but do not actively monitor for 'administrative abuse'. Legitimate wipe commands from the cloud do not trigger typical behavioral detection until devices are already blank. |
Privilege escalation pathways | CVE-2026-25187 (Winlogon) or CVE-2026-21262 (SQL Server) can enable escalation from a standard employee account to sysadmin - from which cloud portal tokens can be harvested. |
IT / MSP supply-chain exposure | Handala consistently targets IT service providers and managed service providers as footholds into downstream victim networks. Validate the security posture of every third-party with privileged access. |
Absent or partial backup strategy | Wipers and cloud-level wipes bypass traditional backup integrations. Only offline, immutable backups - unreachable by MDM commands or GPO scripts - survive Handala-style attacks. |