Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts

Posted on January 2, 2026January 2, 2026 By CWS

In December 2025, the Iranian-linked hacking group Handala claimed to have totally compromised the cellular units of two outstanding Israeli political figures.

Nevertheless, detailed evaluation by Kela cyber intelligence researchers revealed a extra restricted scope—the breaches focused Telegram accounts particularly, not full machine entry.

The group claimed to have breached former Prime Minister Naftali Bennett’s iPhone 13 throughout Operation Octopus, releasing contact lists, pictures, movies, and roughly 1,900 chat conversations.

Shortly after, they claimed comparable entry to Tzachi Braverman’s machine, the Israeli Chief of Workers. Regardless of these dramatic claims, the precise breach uncovered important gaps in account safety slightly than device-level compromise.

Kela analysts performed forensic examination of the leaked supplies and recognized that many of the uncovered conversations had been empty contact playing cards routinely generated by Telegram throughout synchronization.

Solely about 40 conversations contained precise messages, with even fewer displaying substantial exchanges. All uncovered contacts linked to energetic Telegram accounts, confirming the information originated from Telegram itself.

Contacts had been linked to energetic Telegram (Supply – Kela)

Kela researchers and analysts famous that the incident highlighted critical vulnerabilities in session administration and account safety practices, even on encrypted messaging platforms.

Understanding the an infection and account takeover mechanism reveals how Handala compromised these accounts with out full machine entry.

The group seemingly employed a number of assault vectors together with SIM swapping, the place attackers assume management of the sufferer’s cellphone quantity to obtain login verification codes.

They may additionally exploit SS7 protocol weaknesses in telecommunications infrastructure to intercept SMS messages on the community degree. Moreover, Handala could have utilized subtle phishing campaigns that captured one-time passwords via pretend login pages or malicious QR codes.

Session hijacking

Session hijacking represented one other possible vector, the place attackers copied the tdata folder from Telegram Desktop—the authentication file containing energetic session information that grants full account entry when restored elsewhere, bypassing OTP and multi-factor authentication completely.

The group’s operational method additionally included harvesting OTP codes via a number of strategies: triggering verification by way of voice calls, extracting codes from voicemail by exploiting unchanged default PINs, or impersonating Telegram assist to socially engineer workers into disclosing credentials.

Leaked information (Supply – Kela)

Telegram’s default settings considerably amplified these dangers. The cloud password characteristic stays optionally available and disabled by default, which means possession of an OTP alone offers full account entry.

Customary chats lack end-to-end encryption, storing information on Telegram servers as cloud chats slightly than regionally, increasing the assault floor significantly.

Handala publish on cybercrime platform BreachForums (Supply – Kela)

Handala first emerged in December 2023, establishing presence throughout a number of cybercrime boards and working varied Telegram channels and social media accounts.

Their operations primarily focused Israeli firms and organizations, persistently demonstrating assist for Iran and Palestinian causes all through their campaigns, indicating state-sponsored or state-sympathetic motivations.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Accounts, Compromising, Hackers, Handala, Israeli, Officials, Targeted, Telegram

Post navigation

Previous Post: Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
Next Post: 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability

Related Posts

Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data Cyber Security News
Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage Cyber Security News
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News
Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Cyber Security News
Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark