Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Cyber Campaign Uses Multiple Hacker Personas

Iranian Cyber Campaign Uses Multiple Hacker Personas

Posted on April 20, 2026 By CWS

Iran’s Ministry of Intelligence and Security (MOIS) is orchestrating a sophisticated cyber campaign employing multiple hacker identities. This campaign, initially perceived as separate hacktivist activities, is now revealed to be a unified state-directed operation.

Unmasking the Hacker Identities

Among the hacker personas are Homeland Justice, Karma, and Handala. Initially, these groups were thought to function independently. However, thorough investigations have shown that they are all part of a coordinated effort led by the Iranian government. This operation integrates cyber intrusions, data theft, and psychological influence tactics targeting various international entities.

The campaign began to gain attention in 2022 when Homeland Justice launched attacks on the Albanian government. Iranian operatives had infiltrated Albania’s systems over a year before these attacks became public, using their access to exfiltrate sensitive information and conduct destructive activities.

Expansion and Rebranding of Cyber Operations

In 2023, the campaign expanded under new personas. The group rebranded from Homeland Justice to Karma, and later KarmaBelow80, shifting their focus to Israeli targets. Despite the change in identities, the tools and techniques remained consistent, indicating a singular control behind these operations.

DomainTools researchers identified a pattern in domain usage and command-and-control tactics, further linking these activities to a single entity. By 2024, the operation evolved once more, adopting the Handala identity to focus on information warfare and targeted harassment.

Impact and Measures Against the Campaign

The U.S. Justice Department took action in March 2026, confiscating domains linked to these operations. These domains were used to distribute stolen data and incite violence. Security experts have labeled this threat as Void Manticore, also known as MOIST GRASSHOPPER, underlining its connection to MOIS.

This campaign exemplifies the integration of cyber attacks with psychological operations to manipulate public perception. It shows a strategic use of diverse identities to mask the central control and achieve distinct objectives.

Experts recommend vigilance against suspicious activities, particularly in internet-facing services. Organizations are advised to enforce strong network security measures and monitor for signs of manual intrusion.

For ongoing updates and insights into cyber threats, follow us on Google News, LinkedIn, and X. Stay informed and protect your digital assets against evolving cyber threats.

Cyber Security News Tags:cyber espionage, cyber security, cyber threat, cyber warfare, data theft, DomainTools, hacker personas, Handala, Homeland Justice, influence operations, Iran, Karma, MOIS, MOIST GRASSHOPPER, Void Manticore

Post navigation

Previous Post: Vulnerabilities in Serial-to-IP Converters Threaten Critical Systems
Next Post: Cybercriminals Exploit Microsoft Tools in New Phishing Scheme

Related Posts

Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware Cyber Security News
MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender Cyber Security News
AI-Driven Malware Exploits React2Shell Vulnerability AI-Driven Malware Exploits React2Shell Vulnerability Cyber Security News
Microsoft Office Flaw Allows Dangerous Code Execution Microsoft Office Flaw Allows Dangerous Code Execution Cyber Security News
Windows Notepad Vulnerability Fixed in February Update Windows Notepad Vulnerability Fixed in February Update Cyber Security News
Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas
  • Vulnerabilities in Serial-to-IP Converters Threaten Critical Systems
  • Lovable AI Platform Vulnerability Exposes Project Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas
  • Vulnerabilities in Serial-to-IP Converters Threaten Critical Systems
  • Lovable AI Platform Vulnerability Exposes Project Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark