


Team Shieldworkz
Primary alias
Handala / Handala Hack
Backed by
Iran MOIS (IRGC-adjacent)
First documented appearance
December 18, 2023
Primary motive
Destructive / Psychological Ops
Present state
Active, regrouping and recruiting (post-FBI seizure)
On the morning of March 11, 2026, employees at Stryker Corporation offices across 79 countries switched on their computers and found something they had never seen before: a small, barefoot cartoon boy with a slingshot staring back at them from their login screens. Moments later, their devices went dark. Over 200,000 systems had been remotely wiped.
What followed was one of the most operationally destructive cyberattacks ever executed against a U.S. company but not through a sophisticated novel exploit, but through the methodical abuse of Microsoft Intune, Stryker's own device management platform, weaponised by attackers who had been inside the network for months before pulling the trigger. You can read a detailed post on this incident, here.
This report is a forensic deep-dive into the threat actor behind that attack. Handala is not a grassroots hacktivist collective. It is a carefully constructed public-facing persona operated by Void Manticore, a cyber unit inside Iran's Ministry of Intelligence and Security (MOIS) — specifically its Counter-Terrorism Division. Its targeting list, operational tempo, and the geopolitical events that trigger its most destructive campaigns leave no room for ambiguity: this is a state weapon.
The structural shift
The Stryker attack marks a structural shift in Handala's operational doctrine. The group has moved beyond psychological hacktivist operations against Israeli infrastructure into high-impact, kinetic-equivalent attacks against U.S. Fortune 500 companies. This escalation is directly correlated with the Feb 28, 2026 U.S.-Israeli joint military strikes on Iran (Operation Epic Fury). Security teams protecting Western enterprises with any nexus to Israel, U.S. defense, or critical infrastructure should treat Handala as an active, elevated threat.
200K+DEVICES WIPED (STRYKER)
50 TBDATA CLAIMED EXFILTRATED
85+CLAIMED ATTACKS (2024–25)
79COUNTRIES IMPACTED
Origins and identity
Handala the persona borrows its name from a barefoot 10-year-old boy drawn in profile by cartoonist Naji al-Ali in 1969. Iran's intelligence service adopted this symbol wholesale: the same barefoot boy appears in Handala's Telegram channel, on the defacement screens displayed on wiped corporate devices, and in the propaganda images dropped onto destroyed drives.
The timing of the group's emergence was not accidental. Handala Hack launched its Telegram channel and X/Twitter account simultaneously on December 18, 2023 — weeks after the October 7, 2023 Hamas attack on Israel and the subsequent Israeli military campaign in Gaza. It positioned itself within the wave of pro-Palestinian hacktivist activity that followed, initially posting content directly referencing Hamas before pivoting to broader anti-Israel and, increasingly, anti-Western messaging.
The three faces of Handala
Handala is one of the many operational faces this group has. The underlying threat actor maintains at least three public-facing personas, each directed at distinct target sets:
Handala Hack
AKA: Handala, Hatef, Hamsa, HandalaTeam
Status: DOMINANT
Primary public face since late 2023. Used for all Israel-facing and now U.S.-facing operations. Leak platform, propaganda hub, and claim channel. Karma appeared to be the predecessor; Handala absorbed it entirely.
Karma
AKA: KARMA (historical)
Status: DORMANT
Operated in parallel with Handala during early campaigns. Wiper messaging sometimes carried Karma branding while stolen data was released via Handala. Check Point assesses the two teams converged; Karma has not appeared independently since mid-2025.
Homeland Justice
AKA: HomelandJustice (Albania operations)
Status: ACTIVE — Albania-specific
Maintained since mid-2022 specifically for operations against the Albanian government, telecom, and public service organisations. Collaborated with separate MOIS unit Scarred Manticore in Albanian campaigns. Continues to operate independently.
The convergence evidence is compelling: Check Point documented code overlaps in the wipers deployed across all three personas, shared C2 infrastructure, and incidents where Karma-branded wiper messages appeared in compromised environments while the exfiltrated data was leaked through Handala's channels. One team, three faces — each calibrated for a different audience and geopolitical context.
Command structure
Understanding who controls Handala requires peeling back the public hacktivist persona to examine the MOIS organisational structure beneath it. Public reporting — including research by Iranian journalist and researcher Nariman Gharib — has mapped the command chain with reasonable fidelity:
Iran Ministry of Intelligence and Security (MOIS)
Wezarat-e Ettela'at va Amniyat-e Keshvar (VEVAK)
MOIS Internal Security Deputy — Counter-Terrorism (CT) Division
Primary sponsor and oversight structure for Void Manticore operations
Seyed Yahya Hosseini Panjaki — Division Supervisor US TREASURY SANCTIONED Sep 2024 UK / EU SANCTIONED FBI TERRORISM WATCHLIST
Deputy Minister-level official. Oversaw the CT cyber unit that includes Handala operations. Reportedly killed in Israeli strikes on Iranian intelligence targets, early March 2026.
Operators
Hands-on keyboard operatives. Small team; manual, RDP-heavy operations. Multi-persona management (Handala, Karma, Homeland Justice).
Criminal Service Providers (Initial Access Brokers)
The group is documented to purchase initial access and tools from underground criminal services. Infostealer log marketplaces used to source corporate credentials (confirmed in Stryker). Collaboration with Scarred Manticore (separate MOIS unit) in Albanian ops.
Number of affiliates
Direct: none
SecurityWeek confirmed that Seyed Yahya Hosseini Panjaki was killed in the opening phase of Israeli strikes on Iranian intelligence infrastructure in early March 2026. A second named figure, Mohammad Mehdi Farhadi Ramin — previously charged by the U.S. in 2020 for state-sponsored hacking — was also reportedly killed. The loss of the unit's senior leadership creates a period of potential operational disruption, but historically, MOIS cyber units reconstitute within days and may operate with heightened aggression in response to perceived martyrdom of leadership.
BUDGET AND RESOURCING
Handala operates with a budget of US$ 7.7 Mn per year. This money is primarily invested in these areas.
INDICATOR | ASSESSMENT |
|---|---|
Tool procurement | Commercial infostealer logs purchased from criminal markets; no evidence of expensive zero-days. Low tool cost indicates budget optimisation. |
Infrastructure | Primarily commercial VPN services, Starlink satellite connectivity, and co-opted victim infrastructure. Low dedicated infrastructure spend. |
Operator count | Estimated small team of 10–30 operators across all personas backed by a team of administrative enablers. |
Propaganda and media | Dedicated Telegram channels, a professional-grade website (now FBI-seized), and a curated doxxing platform (RedWanted) suggest meaningful investment in the psychological operations layer. |
Comparable units | IRGC-linked CyberAv3ngers is estimated at $5M–$15M annual budget (CSIS). Handala, being MOIS-based and smaller-scale, likely operates in the $2M–$8M range annually. |
Operational history and campaign chronology
Researchers at Reichman University documented at least 85 claimed attacks between February 2024 and February 2025 alone. Handala's targeting closely tracks geopolitical developments. The following represents the most significant verified or high-confidence operations:
DEC 2022 — AUG 2023
Homeland Justice — Albania Pre-History
Before Handala, the same Void Manticore infrastructure executed destructive operations against Albanian government systems under the Homeland Justice persona — targeting the government of Albania's National Agency for Information Society, TIMS border management system, and telecom infrastructure. This established the actor's core playbook: VPN credential theft, destructive wiping, and hack-and-leak for psychological effect.
DEC 18, 2023
Handala emerges — Telegram Launch
Handala and its X/Twitter account launch simultaneously weeks after Oct 7, 2023. Initial messaging positions the group within pro-Palestinian hacktivist ecosystem, explicitly referencing Hamas. Strategic cover established.
EARLY 2024
Israeli Infrastructure Campaign Begins — Operation HamsaUpdate
Multi-target campaign deploying Hamsa (Linux wiper) and Hatef (Windows wiper) against Israeli organisations. Phishing lures written in flawless Hebrew impersonating F5 software updates. Israel National Cyber Directorate issues public advisory with IOCs. Military weather server claims, security camera access in Jerusalem claimed. Doxxing of Israeli intelligence officers begins.
SEP 2024
Soreq Nuclear Research Centre Claim
Handala claims to have breached the Soreq Nuclear Research Centre and exfiltrated approximately 197 GB of classified nuclear project data. Israel's National Cyber Directorate assesses this as primarily psychological warfare. The claim generated global media coverage, demonstrating that Handala treats unverified claims as a primary weapon even absent confirmed technical compromise.
SEP 2024
US Treasury Sanctions Panjaki
U.S. Treasury designates Seyed Yahya Hosseini Panjaki. EU and UK follow. FBI places him on terrorism watchlist. The public designation confirms U.S. government assessment of MOIS command responsibility for Handala operations.
FEB 2025
Israeli Police Data Breach
Claimed exfiltration of 2.1 TB of Israeli police data including personnel records, weapons inventories, and psychological profiles of officers. Israeli police attributed to a third-party vendor compromise. Some published material assessed as outdated, maintaining a pattern of mixing genuine exfiltrated data with amplified or unverified claims.
JAN 2026
Kindergarten PA System Attack
Handala compromises Maagar-Tec emergency alert systems serving over 20 Israeli kindergartens. Air raid sirens activated and threatening Arabic messages broadcast to children. A deliberate escalation targeting civilian psychological impact, demonstrating willingness to cross lines that state-constrained actors typically avoid.
MAR 1, 2026
RedWanted Doxxing Platform Launch
Handala launches RedWanted, a dedicated doxxing site listing individuals and organisations assessed to have supported Israel. Compromised personal emails of former Mossad research director Sima Shine (100,000+ emails) published. Senior Israeli Navy officers doxxed. Hebrew University of Jerusalem targeted. The platform is explicitly designed as a harassment and intimidation infrastructure targeting individuals, not just organisations.
FEB 28, 2026
Operation Epic Fury — The Trigger
U.S.-Israeli joint military strikes on Iranian targets (Operation Epic Fury) launch. Intelligence reporting subsequently suggests Handala had pre-positioned access inside Stryker and potentially other U.S. organisations weeks prior — the strikes did not cause the access, they pulled the trigger on pre-established footholds.
MAR 11, 2026
STRYKER — Most Destructive Operation to Date
Handala wipes 200,000+ devices across Stryker Corporation systems in 79 countries by abusing Microsoft Intune administrative access obtained via Infostealer-harvested credentials. Stryker confirms "severe, global disruption" in SEC 8-K filing. Order processing, manufacturing, and shipping disrupted globally. The Handala logo replaces login screens on affected devices worldwide. Simultaneously claims attack on Verifone (unconfirmed by Verifone).
MAR 20, 2026
FBI Seizes Handala Websites — Domain Takedown
FBI seizes handala-hack[.]to and handala-redwanted[.]to under DOJ court-authorised warrant. DOJ characterises the platforms as "psychological operations" run by Iran's MOIS. Handala acknowledges on Telegram and announces new replacement infrastructure is imminent — a response consistent with previous takedowns of the group's channels.
TTPs — Tactics, Techniques & Procedures
Handala's intrusion chain is deceptively simple. The group does not rely on novel zero-day exploits. Its power comes from the combination of credential abuse, manual hands-on operation, and simultaneous multi-method wiping executed at speed once access is established. This makes them harder to detect before impact and harder to stop during it.
Phase | Technique | Observation |
Reconnaissance | Vulnerability Research | They specifically target Zimbra and Exchange vulnerabilities ($CVE-2022-27925$, for example) to gain an initial foothold. |
Weaponization | Custom Wipers | They use a proprietary wiper often disguised as a "Security Update." It doesn't just delete files; it overwrites the Master Boot Record (MBR). |
Exfiltration | Telegram Bot API | Instead of standard FTP/S3 buckets, they frequently exfiltrate metadata and small sensitive batches via encrypted Telegram channels to bypass standard DLP filters. |
Psychological Ops | Doxxing & Leaks | They release "Proof of Hack" videos on their dedicated "Handala" portal, often featuring UI screenshots of the victim's internal admin panels. |
The Handala attack chain
Credential procurement
Purchase Infostealer logs from criminal markets. Target IT/MSP providers for downstream access. Brute-force VPN infrastructure.
VPN initial access
Compromise VPN using stolen credentials. Origin: Commercial VPN nodes (169.150.227.X), Starlink IPs, or direct Iranian IP ranges (declining OPSEC).
Pre-positioning (Months)
Access maintained months before destructive phase. Domain Admin creds obtained. Access validated and tested quietly before trigger.
Lateral movement via RDP
Manual RDP sessions between systems. NetBird deployed to mesh-connect internal hosts not directly exposed. 5+ attacker systems active simultaneously.
Privilege escalation
Admin tool weaponisation
Domain Admin or Intune Admin credentials used to weaponise MDM/GPO for mass destructive commands.
Simultaneous Multi-Wiper Deployment
4 distinct wiping techniques that run in parallel via GPO. Maximum impact, minimum recovery window.
Psychological payload + a leak
Handala logo on screens. Propaganda GIF on drives. Telegram claim posted. Data leak published for amplification.
Arsenal of wipers
TOOL / TECHNIQUE | PLATFORM | METHOD | DISTINCTIVE FEATURE |
|---|---|---|---|
Handala Wiper(handala.exe) | Windows | Overwrites file contents; attacks MBR to corrupt disk structure | Custom binary; irreversible. Named artifacts left on disk. |
AI-Assisted PowerShell Wiper | Windows | Recursively enumerates and deletes all files in user directories; floods drives with | Verbose comments in code suggest AI-assisted development (LLM-written). Deployed via GPO. |
Hatef Wiper | Windows | Rapid recursive file-level destruction; overwrites with 4096-byte random data blocks | Singleton check prevents multiple instances. Named from Persian "Hatef." Documented by Intezer / Israel INCD. |
Hamsa Wiper | Linux | Bash-based; targets Linux server file systems | Cross-platform capability. Used in tandem with Hatef for mixed Windows/Linux environments. |
VeraCrypt Abuse | Windows | Legitimate disk encryption tool downloaded via victim's own browser over RDP, then used to encrypt drives | Complicates forensic recovery. Downloaded from official site — avoids AV detection of malicious binary. |
Microsoft Intune Weaponisation | Cloud MDM | Admin credentials used to issue legitimate remote-wipe commands to all enrolled endpoints globally | No wiper binary deployed. Uses the organisation's own management infrastructure as a weapon. Bypasses EDR entirely. First documented at this scale at Stryker (Mar 2026). |
NetBird Deployment | Windows | Zero-trust mesh networking tool downloaded via victim browser; creates encrypted internal tunnel | New TTP as of 2026. Allows coordination between multiple attacker footholds. Legitimate tool — evades network-based detection. |
MITRE ATT&CK MAPPING (V15)
TECHNIQUE ID | TACTIC | DESCRIPTION | OBSERVED |
|---|---|---|---|
T1566 / T1598 | Initial Access | Phishing (Hebrew-language lures impersonating F5 updates) and phishing for credentials | Confirmed |
T1133 | Initial Access | Compromised external-facing VPN accounts using stolen credentials | Confirmed |
T1110 | Credential Access | Brute-force VPN login attempts; hundreds of logon attempts per target | Confirmed |
T1199 | Initial Access | Supply chain compromise via IT/MSP providers for downstream victim access | Confirmed |
T1078 | Defence Evasion / Persistence | Valid accounts used throughout; Infostealer-harvested admin credentials | Confirmed |
T1021.001 | Lateral Movement | Remote Desktop Protocol (RDP) for manual lateral movement between internal systems | Confirmed |
T1572 | Command and Control | NetBird zero-trust mesh VPN deployed inside victim network to tunnel C2 traffic | Confirmed |
T1047 | Execution | WMI (wmic.exe) for remote process creation and file operations across AD hosts | Confirmed |
T1484.001 | Defence Evasion | Group Policy Objects used to distribute wipers across all domain-joined systems simultaneously | Confirmed |
T1490 | Impact | Inhibit system recovery: MBR wiping, VeraCrypt drive encryption, GPO-deployed wipers | Confirmed |
T1485 | Impact | Data destruction via custom Handala wiper, Hatef, Hamsa, and PowerShell wiper | Confirmed |
T1491 | Impact | Website and device defacement; Handala logo displayed on compromised login screens | Confirmed |
T1048 | Exfiltration | Exfiltration over alternative protocols; data staged and exfiltrated before destructive phase | Claimed |
T1057 / T1046 | Discovery | Process and network service discovery as part of manual reconnaissance inside victim environment | High Confidence |
Indicators of Compromise (IOCs)
ANALYST NOTE ON IOC RELIABILITY
The group operates primarily through manual, hands-on activity. Its infrastructure is transient: commercial VPN nodes, legitimate tools, and victim-controlled systems. The IOCs below have short shelf lives for blocking but are high-value for hunting and correlation. Domain and IP infrastructure should be used for threat hunting against historical logs rather than perimeter blocking in isolation. No victim-validated forensic IOCs from the Stryker intrusion have been publicly released as of this writing.
INFRASTRUCTURE — DOMAINS (DEFANGED)
Leak Site (seized)handala-hack[.]to
Doxx Platform (seized)handala-redwanted[.]to
Telegram Channelt[.]me/handala9 (actor primary channel; monitor only)
INFRASTRUCTURE — IP RANGES (DEFANGED)
VPN Egress (Primary)169[.]150[.]227[.]X — commercial VPN range
VPN Egress (Secondary)149[.]88[.]26[.]X — commercial VPN range
Starlink (post-Jan 2026)188[.]92[.]255[.]X — Starlink IP range
Starlink (post-Jan 2026)209[.]198[.]131[.]X — Starlink IP range
Israeli VPN Node146[.]185[.]219[.]235 — assessed VPN service node, used intermittently
Vendor-Cited C2 Candidates31[.]57[.]35[.]223 — exposed Windows RPC/SMB (Shodan confirmed)
Vendor-Cited C2 Candidates82[.]25[.]35[.]25 — exposed Windows RPC/SMB (Shodan confirmed)
MALWARE — FILE HASHES (SHA-256 WHERE AVAILABLE)
Hatef Wiper (variant)ca9bf13897af109cb354f2629c10803966eb757ee4b2e468abc04e7681d0d74a
Rhadamanthys InfostealerDeployed via F5-themed phishing lures; numerous variants — search VirusTotal by family
BEHAVIOURAL / HOST INDICATORS
Wiper Artifacthandala.gif dropped on logical drives after wiper execution
Wiper Artifacthandala.exe — custom wiper binary in temp/system32 paths
NetBird Deploymentnetbird.exe downloaded via browser from netbird[.]io to non-standard paths
VeraCrypt Abuseveracrypt[.]fr downloads via victim browser over RDP session; mass drive encryption
Attacker Host PatternDefault Windows hostnames: DESKTOP-XXXXXX or WIN-XXXXXXXX connecting to VPN/RDP
GPO DistributionNew GPO logon scripts and scheduled tasks distributing executables to all domain hosts simultaneously
Current status
As of the date of this report, Handala is in a state of active disruption but not operational shutdown. The FBI website seizure on March 20, 2026 removed the group's primary public leak and propaganda infrastructure. The confirmed killing of Seyed Yahya Hosseini Panjaki — the MOIS official who oversaw the Void Manticore unit — represents a significant leadership disruption without precedent in this actor's history.
However, several factors point to rapid reconstitution:
Handala's immediate Telegram response to the FBI seizure announced new replacement infrastructure is forthcoming — consistent with its response to previous platform takedowns.
The group continues to expand its target scope, claiming attacks on Israeli intelligence officials and Hebrew University even amid the post-Stryker pressure.
MOIS cyber units operate with institutional continuity beyond individual leadership. Replacement supervision is likely underway.
The operational security decline (direct Iranian IP connections, Starlink use) predates the current disruption and may reflect wartime internet restrictions in Iran rather than operational sloppiness that would persist post-reconstitution.
Thereat assessment level
ELEVATED.The combination of geopolitical escalation (active U.S.-Iran-Israel military conflict), demonstrated willingness to attack U.S. corporations, pre-positioning tradecraft (access established months before detonation), and rapid infrastructure reconstitution capability means that security teams should not treat the FBI seizure as a resolution. Handala has declared this "a new chapter in cyber warfare." At the time of this report, the group is rebuilding and is assessed as likely to execute further operations against U.S. and Western targets within 30–60 days.
Potential future targets
Handala's target selection follows a clear geopolitical logic: organisations with direct or contractual relationships to the U.S. or Israeli military, intelligence, or critical economic infrastructure. The IRGC separately published a list of U.S. tech companies — including Google — as targets, signalling broader Iranian cyber intent in the current escalation period.
P1: High
U.S. Defense and Dual-Use Technology Firms
Stryker was targeted because of its $450M DoD medical device contract. Expect similar logic to apply to aerospace, logistics, communications, and cybersecurity firms with DoD/DoD contractor relationships.
P 1 — HIGH
Healthcare and medical device manufacturers
Stryker's disruption impacted hospital supply chains globally. Healthcare is soft-target high-impact: maximum civilian disruption, high media visibility, low OT security maturity.
P 2 — ELEVATED
Financial Services and payment infrastructure
IRGC explicitly named banks and economic centres as legitimate targets. Handala's simultaneous Verifone claim (alongside Stryker) signals payment infrastructure targeting intent. High-value disruption potential.
PRIORITY 2 — ELEVATED
Critical National Infrastructure (Energy, Water, Telecom)
IRGC/Homeland Justice precedent in Albania. ICS/SCADA environments with poor IT/OT segmentation are prime targets for maximum operational disruption. CyberAv3ngers (separate IRGC unit) already targets water utilities.
PRIORITY 2 — ELEVATED
IT Managed Service Providers
MSPs are not end targets — they are access vectors. Handala systematically targets IT and service providers to harvest downstream victim credentials. Any MSP serving sectors above is at elevated risk of being used as an access bridge.
PRIORITY 3 — MODERATE
Gulf State Economic Targets
Handala has claimed attacks against UAE and Saudi energy companies (1.3 TB exfiltration claimed). Gulf normalisation with Israel (Abraham Accords) makes Gulf-Israeli connected organisations a logical extension target.
Defensive recommendations
The Stryker attack's most important lesson for defenders is the weaponisation of administrative infrastructure — Microsoft Intune used as a mass wipe platform. Traditional endpoint detection and response tools generate no telemetry for a legitimate remote-wipe command issued from an authorised admin console. Defending against Handala requires identity-first architecture and MDM governance.
PRIORITY | CONTROL | RATIONALE FROM HANDALA TTPS |
|---|---|---|
CRITICAL | Phishing-resistant MFA (FIDO2) on all Intune, Azure AD, and MDM admin accounts | Infostealer-harvested credentials were the initial access vector for Stryker. Phishing-resistant MFA defeats credential replay entirely. |
CRITICAL | Audit and alert on all Intune remote-wipe commands; implement approval workflow for mass device actions | 200,000+ devices wiped via legitimate Intune admin commands. No alert fired. Mass remote-wipe must require out-of-band approval. |
CRITICAL | Block and alert on connections from Starlink IP ranges, Iranian IP space, and commercial VPN ranges to VPN/RDP | Handala's egress infrastructure is documented. Geolocation and ASN-based controls at the VPN perimeter are highly effective. |
HIGH | Monitor for NetBird.exe and VeraCrypt downloads from legitimate sites via browser on managed endpoints | Handala downloads both tools interactively via victim browser over RDP. Context-aware DLP will flag unusual download of zero-trust networking tools. |
HIGH | Infostealer credential monitoring — subscribe to commercial dark web monitoring for corporate credentials | Stryker's admin credentials were in Infostealer logs months before the attack. Mandatory 4-hour rotation SLA upon detection. |
HIGH | Restrict GPO creation and modification rights; alert on new GPO logon scripts and scheduled tasks | Handala distributes wipers via GPO across the domain. New GPO creation by non-baseline accounts is a high-fidelity detection signal. |
HIGH | Hunt for default Windows hostnames (DESKTOP-XXXXXX, WIN-XXXXXXX) appearing in VPN/RDP logs from external IPs | Handala operators consistently connect from default-hostname Windows machines — a high-fidelity behavioural signature in authentication logs. |
MODERATE | Immutable, air-gapped backups for all systems; test restore procedures for MDM configurations monthly | Wiper attacks are only catastrophic if there is no clean backup. Offline, immutable backup is the last line of defence against destructive campaigns. |
Detection tips
Handala establishes access months before the destructive phase. This is the detection window. Hunt for anomalous VPN logons from foreign ASNs, unusual RDP source-destination pairs, and privileged account access during off-hours in your historical logs going back 90–180 days. If Handala is pre-positioned in your environment, the footprints are there. The question is whether your detection architecture is instrumented to find them before the wiper fires.
If you are auditing your environment or in the middle of an IEC 62443-based risk assessment, look for these specific anomalies:
Network: Outbound traffic to
91.92.241[.]xxx(known Handala C2 range).Filesystem: Presence of
Setup_Security.exeorUpdate_Patch.exewith a null or spoofed digital signature in the%TEMP%directory.Behavioral: Mass execution of
vssadmin.exe delete shadows /all /quietfollowed by an immediate system reboot.
Actionable intelligence
Block Telegram APIs: If your business doesn't require Telegram for operations, block
api.telegram.orgat the firewall. This breaks their primary exfiltration and C2 channel.MFA for Everything: Handala relies heavily on credential harvesting from initial phishing. If an account doesn't have hardware-backed MFA (FIDO2), it is a door left wide open.
Additional reading
A downloadable report on the Stryker cyber incident
IEC 62443-based OT/ICS risk assessment checklist for the food and beverage manufacturing sector
Removable media scan solution vendor evaluation and selection checklist
Get Weekly
Resources & News
You may also like

From click to crisis: How Nova Scotia Power got breached

Team Shieldworkz

Unpacking Handala’s resilience playbook

Prayukth K V

Mapping NIST CSF 2.0 to IEC 62443: A Practical Framework for Industrial OT Security

Team Shieldworkz

Deploying IEC 62443 security controls in IACS: A practical implementation guide

Prayukth K V

Addressing NIS2 implementation challenges

Team Shieldworkz

Air-Gapped SCIFs and NERC CIP-015: Why Traditional SCADA Security Falls Short

Team Shieldworkz

