Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Handala Hack Targets US, Israel with Destructive Cyberattacks

Handala Hack Targets US, Israel with Destructive Cyberattacks

Posted on March 17, 2026 By CWS

An Iranian cyber group known as Handala Hack has launched a series of destructive attacks against targets in Israel, the United States, and Albania. These operations utilize remote desktop access, network tunneling, and several data-wiping methods simultaneously.

Group Identity and Objectives

Operating under the broader identity of Void Manticore, also known as Red Sandstorm and Banished Kitten, Handala Hack is closely associated with Iran’s Ministry of Intelligence and Security (MOIS). Unlike espionage-focused attacks, the group’s activities are designed to obliterate data, making recovery efforts extremely difficult.

Handala Hack draws its name from a renowned Palestinian cartoon character and has been active since late 2023. The group also uses the aliases Karma and Homeland Justice, with the latter having targeted Albanian government sectors since mid-2022. Recently, the group expanded its reach to the United States, impacting organizations like the medical technology company Stryker.

Evolution of Attack Techniques

According to research by Check Point, Handala Hack’s attack strategies have evolved, with new techniques emerging alongside their established methods. The group has incorporated NetBird, a legitimate peer-to-peer networking tool, to tunnel traffic within victim networks, and has begun using AI-assisted PowerShell scripts in their data-wiping arsenal.

Notably, the group’s operational discipline has declined, with their activities now traceable to Iranian IP addresses, moving away from the commercial VPN services they previously used. The attack process typically starts by exploiting compromised VPN credentials through brute-force tactics or supply chain attacks on IT service providers.

Destructive Methods and Defensive Measures

Handala Hack is distinguished by its use of multiple wipers concurrently, ensuring swift and extensive data destruction. The group’s tactics include deploying the Handala Wiper via Group Policy logon scripts, which overwrites file contents and corrupts the Master Boot Record (MBR) for severe damage. This wiper operates remotely from the Domain Controller, evading detection by security tools.

In addition, the group uses an AI-assisted PowerShell wiper to erase files and flood drives with propaganda images. They also employ VeraCrypt to encrypt drives, hindering recovery efforts. Finally, operators manually delete virtual machines and files via RDP, a practice highlighted in their own leaked videos.

To counter these threats, organizations should enforce multi-factor authentication on all remote and privileged accounts and monitor for logins from unfamiliar locations or at odd hours. Blocking connections from Iranian IP addresses and known Starlink IP ranges is recommended, as is disabling RDP access where unnecessary.

For more cybersecurity updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for instant updates.

Cyber Security News Tags:Cyberattacks, Cybersecurity, data wiping, Handala Hack, Israel, MOIS, NetBird, Remote Desktop Protocol, US, Void Manticore

Post navigation

Previous Post: MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics
Next Post: CamelClone Espionage Targets Governments via File-Sharing

Related Posts

Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News
U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News
Phishing Scam Targets Booking.com Users in Fraud Scheme Phishing Scam Targets Booking.com Users in Fraud Scheme Cyber Security News
Critical VMware Vulnerability Exposes IT Systems to Risks Critical VMware Vulnerability Exposes IT Systems to Risks Cyber Security News
Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Cyber Security News
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing
  • Handala Hack Targets US, Israel with Destructive Cyberattacks
  • MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing
  • Handala Hack Targets US, Israel with Destructive Cyberattacks
  • MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News