Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Handala Hack Targets US, Israel with Destructive Cyberattacks

Handala Hack Targets US, Israel with Destructive Cyberattacks

Posted on March 17, 2026 By CWS

An Iranian cyber group known as Handala Hack has launched a series of destructive attacks against targets in Israel, the United States, and Albania. These operations utilize remote desktop access, network tunneling, and several data-wiping methods simultaneously.

Group Identity and Objectives

Operating under the broader identity of Void Manticore, also known as Red Sandstorm and Banished Kitten, Handala Hack is closely associated with Iran’s Ministry of Intelligence and Security (MOIS). Unlike espionage-focused attacks, the group’s activities are designed to obliterate data, making recovery efforts extremely difficult.

Handala Hack draws its name from a renowned Palestinian cartoon character and has been active since late 2023. The group also uses the aliases Karma and Homeland Justice, with the latter having targeted Albanian government sectors since mid-2022. Recently, the group expanded its reach to the United States, impacting organizations like the medical technology company Stryker.

Evolution of Attack Techniques

According to research by Check Point, Handala Hack’s attack strategies have evolved, with new techniques emerging alongside their established methods. The group has incorporated NetBird, a legitimate peer-to-peer networking tool, to tunnel traffic within victim networks, and has begun using AI-assisted PowerShell scripts in their data-wiping arsenal.

Notably, the group’s operational discipline has declined, with their activities now traceable to Iranian IP addresses, moving away from the commercial VPN services they previously used. The attack process typically starts by exploiting compromised VPN credentials through brute-force tactics or supply chain attacks on IT service providers.

Destructive Methods and Defensive Measures

Handala Hack is distinguished by its use of multiple wipers concurrently, ensuring swift and extensive data destruction. The group’s tactics include deploying the Handala Wiper via Group Policy logon scripts, which overwrites file contents and corrupts the Master Boot Record (MBR) for severe damage. This wiper operates remotely from the Domain Controller, evading detection by security tools.

In addition, the group uses an AI-assisted PowerShell wiper to erase files and flood drives with propaganda images. They also employ VeraCrypt to encrypt drives, hindering recovery efforts. Finally, operators manually delete virtual machines and files via RDP, a practice highlighted in their own leaked videos.

To counter these threats, organizations should enforce multi-factor authentication on all remote and privileged accounts and monitor for logins from unfamiliar locations or at odd hours. Blocking connections from Iranian IP addresses and known Starlink IP ranges is recommended, as is disabling RDP access where unnecessary.

For more cybersecurity updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for instant updates.

Cyber Security News Tags:Cyberattacks, Cybersecurity, data wiping, Handala Hack, Israel, MOIS, NetBird, Remote Desktop Protocol, US, Void Manticore

Post navigation

Previous Post: MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics
Next Post: CamelClone Espionage Targets Governments via File-Sharing

Related Posts

Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
Microsoft Introduces Efficiency Mode in Teams for Low-End Devices Microsoft Introduces Efficiency Mode in Teams for Low-End Devices Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
A Milestone Powering Crypto’s Global Reach A Milestone Powering Crypto’s Global Reach Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark