Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

“Handala Hack” – Unveiling Group’s Modus Operandi

0
Medium
Vulnerability
Published: Thu Mar 12 2026 (03/12/2026, 17:21:23 UTC)
Source: Check Point Research

Description

The Handala Hack, also known as Void Manticore, is an Iranian threat actor group specializing in destructive wiping attacks combined with hack-and-leak operations. Active since mid-2022, the group operates multiple online personas, notably Homeland Justice, to conduct targeted cyberattacks. Their modus operandi involves data destruction and public exposure of stolen information to maximize operational impact. While no specific vulnerabilities or exploits are detailed, their campaigns have targeted strategic entities, leveraging destructive malware to disrupt operations. The threat actor’s activities pose a medium-level risk due to the combination of data loss and reputational damage. No known exploits in the wild have been reported, but the group’s persistence and destructive intent warrant vigilance. Organizations in geopolitically sensitive regions and sectors with high-value data are at increased risk. Mitigation requires proactive threat intelligence sharing, robust incident response planning, and enhanced monitoring for destructive malware indicators. Countries with significant exposure include the United States, Israel, Saudi Arabia, United Arab Emirates, and European Union members due to their geopolitical relevance and past targeting patterns.

AI-Powered Analysis

AILast updated: 03/12/2026, 17:30:54 UTC

Technical Analysis

The Handala Hack, tracked by Check Point Research as Void Manticore, is an Iranian cyber threat actor group known for combining destructive wiping malware attacks with hack-and-leak operations. Since mid-2022, the group has operated multiple online personas, with Homeland Justice being the most prominent, to carry out targeted campaigns. Their attacks typically involve gaining unauthorized access to victim networks, deploying destructive malware that erases critical data and system components, and subsequently leaking stolen sensitive information to amplify damage and exert pressure on victims. This dual approach of destruction and data exposure aims to disrupt operations and damage the reputation of targeted organizations. Although no specific software vulnerabilities or CVEs have been publicly identified in relation to their attacks, the group’s tactics, techniques, and procedures (TTPs) indicate a sophisticated capability to infiltrate and cause significant operational disruption. The absence of known exploits in the wild suggests either targeted, controlled operations or limited public disclosure. The group’s focus on hack-and-leak campaigns aligns with geopolitical motives, targeting entities in sectors such as government, defense, energy, and critical infrastructure. Their operations demonstrate a medium severity threat level due to the potential for data loss, operational downtime, and reputational harm. The detailed analysis by Check Point Research highlights the importance of understanding the group’s modus operandi to anticipate and mitigate future attacks effectively.

Potential Impact

The Handala Hack group’s operations can have significant impacts on affected organizations worldwide. The destructive wiping attacks can lead to permanent data loss, operational downtime, and costly recovery efforts, severely disrupting business continuity. The hack-and-leak component exposes sensitive or confidential information, potentially resulting in reputational damage, regulatory penalties, and loss of stakeholder trust. Organizations in critical sectors such as government, defense, energy, and infrastructure are particularly vulnerable, as successful attacks could impair national security or essential services. The combination of destruction and data exposure increases the complexity and severity of incidents, requiring comprehensive response strategies. While no widespread exploitation has been reported, the group’s demonstrated capabilities and persistence suggest a credible ongoing threat. The medium severity rating reflects the balance between the threat’s destructive potential and the current lack of mass exploitation or publicly known vulnerabilities. Nonetheless, the geopolitical context and targeted nature of the attacks underscore the need for heightened vigilance and preparedness among potential targets.

Mitigation Recommendations

To mitigate the threat posed by the Handala Hack group, organizations should implement a multi-layered defense strategy tailored to detect and respond to destructive malware and data exfiltration attempts. Specific recommendations include: 1) Enhance network segmentation and access controls to limit lateral movement and contain breaches. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying destructive behaviors and unusual data access patterns. 3) Conduct regular, secure, and offline backups to enable recovery from wiping attacks without paying ransoms or losing data. 4) Implement robust threat intelligence sharing with industry peers and government agencies to stay informed about emerging TTPs associated with this group. 5) Develop and regularly test incident response plans that include scenarios involving data destruction and leak events. 6) Employ strict privilege management and multi-factor authentication to reduce the risk of initial compromise. 7) Monitor for indicators of compromise (IOCs) related to the group’s known personas and malware signatures. 8) Educate staff on phishing and social engineering tactics that may be used to gain initial access. These targeted measures go beyond generic advice by focusing on the specific destructive and leak-oriented tactics characteristic of the Handala Hack group.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/","fetched":true,"fetchedAt":"2026-03-12T17:30:39.883Z","wordCount":2525}

Threat ID: 69b2f83f2f860ef943cde4ea

Added to database: 3/12/2026, 5:30:39 PM

Last enriched: 3/12/2026, 5:30:54 PM

Last updated: 3/12/2026, 7:58:57 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses