Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals

Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals

Posted on November 28, 2025November 28, 2025 By CWS

The Handala hacker group has launched a focused marketing campaign towards Israeli high-tech and aerospace professionals, marking a regarding shift in geopolitically motivated cyber operations.

The group lately printed a listing of people working in these crucial sectors, accompanied by hostile descriptions that falsely label them as criminals.

This marketing campaign represents a big escalation from conventional propaganda actions to lively doxxing and intelligence gathering towards private-sector workers.

The assault facilities on the general public publicity of non-public {and professional} info belonging to Israeli specialists.

Handala launched the dataset via their darkish net platform and provided monetary rewards to anybody keen to offer further details about the focused people.

This bounty-style method creates a crowdsourced intelligence assortment mechanism that amplifies the menace past the preliminary knowledge leak and endangers bizarre professionals.

Trustwave safety researchers recognized this exercise throughout ongoing darkish net monitoring operations. Their evaluation revealed that the printed dataset depends closely on info scraped from LinkedIn profiles.

A few of the specialists featured on Handala’s put up (Supply – Trustwave)

Nonetheless, the researchers famous a number of inconsistencies inside the knowledge, together with people who left their listed corporations years in the past, workers in non-sensitive roles, and profiles with no verifiable connection to the high-tech sector in any respect.

Knowledge Manipulation and Weaponization Methods

The technical evaluation of Handala’s strategies exhibits a mixture of automated knowledge scraping and handbook knowledge manipulation.

A number of profiles couldn’t be traced or verified, suggesting the group could also be supplementing official LinkedIn knowledge with fabricated entries or info from unverifiable sources.

This method permits them to inflate their goal listing whereas sustaining a veneer of authenticity that makes the marketing campaign seem extra complete.

A put up printed on Handala’s webpage (Supply – Trustwave)

The indiscriminate nature of this knowledge assortment demonstrates how publicly out there info might be weaponized at scale.

By framing bizarre employees as legal targets and pairing this with monetary incentives for added intelligence, Handala has created a harmful mechanism that poses direct dangers to the privateness, security, {and professional} reputations of official workers.

Handala’s assertion promising a reward for info on one of many featured specialists on its put up (Supply – Trustwave)

Safety specialists advocate heightened private knowledge hygiene, steady monitoring for identity-related threats, and organizational consciousness applications to guard towards related concentrating on campaigns sooner or later.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Aerospace, GroupAttacking, Hacker, Handala, HighTech, Israeli, Professionals

Post navigation

Previous Post: MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Next Post: In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked

Related Posts

Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Cyber Security News
BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service Cyber Security News
Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Cyber Security News
Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches Cyber Security News
New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same Cyber Security News
New PyStoreRAT Malware Targets IT and OSINT Experts New PyStoreRAT Malware Targets IT and OSINT Experts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News