Threat Actor Characterization
Handala Team
ID: 6907c3f629dd073bc8fcc4762691278f71272| Handala | Handala Group | Ha********** | Ha*************** |
| H** | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Handala Hack Team is an Iran-aligned cyber persona assessed in public reporting as linked to MOIS-associated activity and used for hack-and-leak, wiper, intimidation, and disruptive operations primarily against Israeli targets and adjacent ecosystems.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1055.012 | Process Hollowing | TA0004 TA0005 |
|
| T1218.009 | Regsvcs/Regasm | TA0005 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1561.001 | Disk Content Wipe | TA0040 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1114 | Email Collection | TA0009 |
|
| T1005 | Data from Local System | TA0009 |
|
| T1589.001 | Credentials | TA0043 |
|
| T1585.001 | Social Media Accounts | TA0042 |
|
Handala / Handala Hack Team (HHT) / Handala Hack
Classification: TLP:WHITE — (Cyber / “Faketivist” / State-linked)
Author: iQBlack Team
Executive Summary
Handala (often branded as Handala Hack Team / Handala Hack) is a pro-Palestinian, Iran-aligned cyber actor that emerged around December 2023, shortly after the outbreak of the Israel–Hamas war. While initially framed as another “hacktivist” outfit running DDoS and simple website attacks, multiple government and private-sector assessments now attribute Handala to Iran’s Ministry of Intelligence (MOIS), tracked in some taxonomies as Storm-0842 / Banished Kitten / Void Manticore, i.e. a state-directed psychological warfare unit masquerading as a grassroots collective.
Handala’s activity focuses overwhelmingly on Israeli targets (and, to a lesser extent, foreign entities linked to Israel), including government, defense, healthcare, high-tech, telecom, transportation, and education sectors. Their core pattern is “hack-and-leak with psy-ops”: compromise, selective data theft, release of mixed authentic and fabricated data, and aggressive messaging aimed at eroding public trust in Israeli institutions, senior officials and security services rather than monetizing access.