Handala Hackers Use RDP and NetBird In MOIS-Linked Wiper Attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


The Iranian state-sponsored threat group known as Handala Hack is intensifying its destructive cyber operations against international organizations.

Check Point Affiliated with Iran’s Ministry of Intelligence and Security (MOIS), the group relies heavily on manual hacking techniques, compromised credentials, and network tools like NetBird and Remote Desktop Protocol (RDP) to launch aggressive data-wiping attacks.​

Threat Actor Profile and Tactics

Handala Hack, which cybersecurity researchers also track under the name Void Manticore, operates multiple online personas to carry out its campaigns.

These include Homeland Justice, a persona dedicated to targeting government and telecom sectors in Albania, and Karma.

Over time, Handala Hack has become the group’s most prominent public face, claiming responsibility for numerous intrusions in Israel and recently expanding its attacks to major U.S.-based enterprises like Stryker.

Unlike highly sophisticated advanced persistent threats that rely on complex automated malware, Handala Hack prefers hands-on, manual network intrusions. Hackers typically gain an initial foothold by exploiting compromised commercial VPN accounts.

Logos of Void Manticore personas (from left to right): Homeland Justice, Handala and Karma (Source: checkpoint)

They look for vulnerabilities in IT service providers to steal user credentials. Recently, researchers have observed the group connecting to victim networks using Starlink Internet Protocol (IP) addresses and even directly from Iranian IP addresses, indicating a shift in their operational security practices.​

This legitimate zero-trust networking platform allows hackers to create a private, encrypted mesh network inside the victim’s infrastructure. By establishing multiple footholds, the group can operate more efficiently and accelerate its destructive activities.​

Destructive Wiping and Defenses

The ultimate goal of Handala Hack is to cause maximum operational disruption through data destruction, often combined with hack-and-leak extortion tactics.

Operational interconnections of Void Manticore (Source: checkpoint)
Operational interconnections of Void Manticore (Source: checkpoint)

During Check Point final destructive phase of an intrusion, threat actors deploy up to four simultaneous wiping techniques. To ensure widespread damage, they leverage Windows Group Policy to distribute their malicious tools across the entire network.

Wiper execution of Handala Wiper (Source: checkpoint)
Wiper execution of Handala Wiper (Source: checkpoint)

The group’s coordinated wiping operations include:

  • Custom Handala Wiper: The attackers deploy a custom executable that actively overwrites file contents. It also attacks the master boot record (MBR) of the system, corrupting the disk structure to cause irreversible data loss.​
  • AI-Assisted PowerShell Wiper: A malicious script, likely developed with the help of artificial intelligence, automatically scans and deletes all files within user directories. It then leaves a propaganda image behind on the wiped drives.​
Type Indicator
Handala Wiper 5986ab04dd6b3d259935249741d3eff2
Handala Powershell Wiper 3cb9dea916432ffb8784ac36d1f2d3cd
VeraCrypt Installer 3236facc7a30df4ba4e57fddfba41ec5
NetBird Installer 3dfb151d082df7937b01e2bb6030fe4a
NetBird e035c858c1969cffc1a4978b86e90a30
Handala VPS 82.25.35[.]25

Despite the severe impact of these attacks, the group’s reliance on relatively simple techniques provides defenders with clear opportunities to stop them. Organizations can protect themselves by focusing on credential hygiene and network monitoring.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW