Handala
Pro-Palestine hacktivist persona operated by the Iranian MOIS-affiliated **Void Manticore** cluster — see the parent actor entry for the full attribution chain. Named for the Naji al-Ali cartoon character; emerged December 2023; claims destructive intrusions and data leaks against Israeli organizations across defense, technology, infrastructure, hospitals, and universities. The March 2026 Stryker compromise (200,000+ devices wiped via abuse of the victim's Microsoft Intune tenant) was the persona's first claimed operation against a major U.S. multinational, expanding the target set beyond Israel. Sister personas operated by Void Manticore include Karma (Israel 2023) and Homeland Justice (Albania 2022).
Aliases
Motivations
Target sectors
Target countries
Lineage & relationships
full graph →Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
1 eventIndicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| MD5 | family · Handala Wiper Handala Wiper executable ('handala.exe') MD5 published in Check Point Research's 2026 'Handala Hack - Unveiling Group's Modus Operandi' follow-up to the May 2024 'Bad Karma, No Justice' report. CPR explicitly attributes the Handala persona to Void Manticore (aka Red Sandstorm / Banished Kitten), affiliated with Iran's MOIS Counter-Terrorism Division. | Mar 31, 2024 | Check Point Research |
| IPv4 | Handala-controlled VPS IP listed in Check Point Research's 2026 report. Used alongside 31.57.35.223 and 107.189.19.52 for hands-on-keyboard operations via RDP and NetBird remote access tooling during MOIS-attributed destructive intrusions in Israel. | Mar 31, 2024 | Check Point Research |
| MD5 | family · Handala Wiper Handala PowerShell wiper component MD5 from Check Point Research's 2026 Handala Hack report. Distributed via Group Policy logon scripts as a scheduled task; the batch loader 'handala.bat' chains the executable and the PowerShell script to overwrite files and corrupt the MBR. | Mar 31, 2024 | Check Point Research |
Related actors
shared ATT&CK techniques- ?? · UnknownALPHV/BlackCat2 shared techniques
- KP · DPRKAndariel2 shared techniques
- RU · RussiaConti2 shared techniques
- RU · RussiaDarkSide2 shared techniques
- RU · RussiaINC Ransom2 shared techniques
- IR · IranPioneer Kitten2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Handala — actor profile. Retrieved from https://threatintel.local/actors/handala