Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts

Posted on January 2, 2026January 2, 2026 By CWS

In December 2025, the Iranian-linked hacking group Handala claimed to have totally compromised the cellular units of two outstanding Israeli political figures.

Nevertheless, detailed evaluation by Kela cyber intelligence researchers revealed a extra restricted scope—the breaches focused Telegram accounts particularly, not full machine entry.

The group claimed to have breached former Prime Minister Naftali Bennett’s iPhone 13 throughout Operation Octopus, releasing contact lists, pictures, movies, and roughly 1,900 chat conversations.

Shortly after, they claimed comparable entry to Tzachi Braverman’s machine, the Israeli Chief of Workers. Regardless of these dramatic claims, the precise breach uncovered important gaps in account safety slightly than device-level compromise.

Kela analysts performed forensic examination of the leaked supplies and recognized that many of the uncovered conversations had been empty contact playing cards routinely generated by Telegram throughout synchronization.

Solely about 40 conversations contained precise messages, with even fewer displaying substantial exchanges. All uncovered contacts linked to energetic Telegram accounts, confirming the information originated from Telegram itself.

Contacts had been linked to energetic Telegram (Supply – Kela)

Kela researchers and analysts famous that the incident highlighted critical vulnerabilities in session administration and account safety practices, even on encrypted messaging platforms.

Understanding the an infection and account takeover mechanism reveals how Handala compromised these accounts with out full machine entry.

The group seemingly employed a number of assault vectors together with SIM swapping, the place attackers assume management of the sufferer’s cellphone quantity to obtain login verification codes.

They may additionally exploit SS7 protocol weaknesses in telecommunications infrastructure to intercept SMS messages on the community degree. Moreover, Handala could have utilized subtle phishing campaigns that captured one-time passwords via pretend login pages or malicious QR codes.

Session hijacking

Session hijacking represented one other possible vector, the place attackers copied the tdata folder from Telegram Desktop—the authentication file containing energetic session information that grants full account entry when restored elsewhere, bypassing OTP and multi-factor authentication completely.

The group’s operational method additionally included harvesting OTP codes via a number of strategies: triggering verification by way of voice calls, extracting codes from voicemail by exploiting unchanged default PINs, or impersonating Telegram assist to socially engineer workers into disclosing credentials.

Leaked information (Supply – Kela)

Telegram’s default settings considerably amplified these dangers. The cloud password characteristic stays optionally available and disabled by default, which means possession of an OTP alone offers full account entry.

Customary chats lack end-to-end encryption, storing information on Telegram servers as cloud chats slightly than regionally, increasing the assault floor significantly.

Handala publish on cybercrime platform BreachForums (Supply – Kela)

Handala first emerged in December 2023, establishing presence throughout a number of cybercrime boards and working varied Telegram channels and social media accounts.

Their operations primarily focused Israeli firms and organizations, persistently demonstrating assist for Iran and Palestinian causes all through their campaigns, indicating state-sponsored or state-sympathetic motivations.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Accounts, Compromising, Hackers, Handala, Israeli, Officials, Targeted, Telegram

Post navigation

Previous Post: Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
Next Post: 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability

Related Posts

Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps Cyber Security News
Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Cyber Security News
New Research Unmask DPRK IT Workers Email Address and Hiring Patterns Cyber Security News
Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cyber Security News
Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark