Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

March 24, 2026

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

March 24, 2026

Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities

March 24, 2026
Facebook X (Twitter) Instagram
Tuesday, March 24
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals
News

Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals

Team-CWDBy Team-CWDMarch 24, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An Iranian government hacking collective has been targeting dissidents, journalists and opposition groups in a campaign dating back to autumn 2023, the FBI has revealed.

The Handala group, which claimed responsibility for a recent wiper attack on US medtech firm Stryker, is said to be linked to Tehran’s Ministry of Intelligence and Security (MOIS).

It was pegged for multiple attacks on various opposition groups in the form of intelligence collection and hack-and-leak efforts.

“The malware used as part of this cyber activity included a multi-stage payload enabling remote user access to the infected devices. Threat actors used social engineering to customize the first stage of the malware to masquerade as commonly used programs or services on Windows machines,” the FBI revealed.

“The second stage connected the infected machine to Telegram command and control bots that enabled remote user access to exfiltrate screen captures or files from the victim devices.”

Read more on Handala: Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity.

In at least one case, the threat actors masqueraded as tech support from a social messaging platform and persuaded the victim to accept a file transfer containing malware.

“Based on multiple observations, stage one of the malware appeared to be tailored to the victim’s pattern of life to increase likelihood of victim downloading the malware, which indicates the Iranian cyber actors likely performed target reconnaissance prior to engaging with the victim,” the FBI report noted.

Multiple malware samples obtained by investigators reveal the malware disguised as software from Pictory, KeePass, WhatsApp and Telegram. The malware achieved defensive evasion by excluding directories and using PowerShell to execute, the report continued.

Functionality included screen and audio recordings, cache captures, file compression, and file deletion.

The second stage malware reportedly connects an infected machine to a Telegram command-and-control (C2) bot, enabling remote access and data exfiltration.

How to Stay Safe from Handala

The FBI urged individuals and organizations to resist these hacking attempts by:

  • Ensuring devices are updated with latest operating system and software versions
  • Only downloading software from trusted sources, such as official app stores or vendor websites
  • Installing anti-malware software on devices 
  • Using strong, unique passwords and enabling multi-factor authentication
  • Reporting suspicious emails or messages to the email client, and reporting suspected crimes to the local FBI field office



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAndroid 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
Next Article DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
Team-CWD
  • Website

Related Posts

News

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

March 24, 2026
News

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

March 24, 2026
News

Dmytro Kuleba to Address the New Cyber Frontline at Infose Europe

March 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

In memoriam: David Harley

November 12, 2025

What it takes to fool facial recognition

March 14, 2026

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.