Photonews Logo Photonews logo
  • Home
  • Pakistan
    • Punjab
    • Sindh
    • Khyber Pakhtunkhwa
    • Azad Jammu Kashmir
    • Balochistan
    • Gilgit – Baltistan
  • World
  • Business
  • Entertainment
  • Videos
    Zayn Malik
    Videos

    Zayn Malik Releases Die For Me Music Video Ahead of New Album

    February 6, 2026 3 Min Read
    Masters of the Universe teaser
    Videos

    Masters of the Universe Teaser Reveals Nicholas Galitzine as He-Man

    January 22, 2026 3 Min Read
    Bridgerton Season 4 trailer
    EntertainmentVideos

    Bridgerton Season 4 Trailer Reveals Benedict’s Love Story

    December 26, 2025 2 Min Read
  • Sports
  • Technology
  • Offbeat
  • Blog
  • Contact
Reading: How does the Handala Hacking Group Carry Out Attacks?
PhotoNews PakistanPhotoNews Pakistan
Font ResizerAa
Search
  • Home
  • Pakistan
    • Punjab
    • Sindh
    • Khyber Pakhtunkhwa
    • Balochistan
    • Azad Jammu Kashmir
    • Gilgit – Baltistan
  • World
  • Business
  • Entertainment
  • Videos
  • Sports
  • Technology
  • Offbeat
  • Blog
  • Contact
Have an existing account? Sign In
Follow US
© 2022 Photonews. All Rights Reserved.
Hands typing on a laptop with an Iran-flag graphic on the screen, representing cyber hacking activity.
PhotoNews Pakistan > Offbeat > How does the Handala Hacking Group Carry Out Attacks?
Offbeat

How does the Handala Hacking Group Carry Out Attacks?

Web Desk
By Web Desk Published March 11, 2026 2 Min Read
Share
Hands typing on a laptop beneath a flag graphic, illustrating suspected cyber activity linked to the Handala hacking group. Image Credit: X
SHARE

Handala is a self-described pro-Palestinian cyber persona that has claimed responsibility for recent attacks targeting Stryker and the Academy of the Hebrew Language. Reporting on the Stryker incident said the group’s logo appeared on login pages, though some details of the attack remained under investigation.

Security researchers say Handala is more than a loose online brand. CrowdStrike identifies Handala Hack Team as a persona used by BANISHED KITTEN, an Iran-nexus adversary with links to Iran’s Ministry of Intelligence and Security, while Check Point describes Handala as one of the online identities associated with Void Manticore, another Iran-linked designation for the same activity cluster.

According to Check Point, the group focuses on disruption, data leaks, and psychological pressure. Its operations are designed not only to breach systems but also to create reputational damage by timing leaks and public claims for maximum impact.

The Handala Hacking Group: We declare to the world that, in retaliation for the brutal attack on the Minab school and in response to the ongoing cyber attacks against the resistance axis's infrastructure, our major cyber operation has been successfully completed. Striker…

— CGTN Africa (@cgtnafrica) March 11, 2026

Handala Hacking Group Explained Through Its Tactics

Threat intelligence reporting says Handala often relies on phishing and other intrusion methods to gain access, then combines that access with destructive activity. Check Point said Void Manticore has used custom wiper malware in attacks tied to its online personas, while outside tracking sources describe Handala as a destructive actor rather than a typical profit-driven ransomware group.

🚨 NEW: The hacker group “Handala” claims to have breached Persian-language communication networks linked to the Israeli military and obtained contact numbers and personal details of alleged informants operating in countries aligned with Iran’s “Axis of Resistance.”

➤… pic.twitter.com/eZuQLHAUco

— Drop Site (@DropSiteNews) March 6, 2026

The group also tries to make its tools harder to block. The source content says Handala has used file-sharing services such as Mega and Storj to host malicious payloads, a tactic that aligns with broader threat reporting describing flexible delivery methods and information operations.

Its name carries political symbolism as well. Handala is derived from the well-known Palestinian cartoon character created by Naji al-Ali in 1969, which helps present the cyber persona as a resistance symbol while security firms assess it as part of a state-linked influence and disruption effort.

TAGGED:Featured
Share This Article
Facebook Twitter Pinterest Whatsapp Whatsapp LinkedIn Email Copy Link Print
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Advertisement

Recent Posts

Former Patriots quarterback Tom Brady gestures to the crowd as owner Robert Kraft speaks during halftime ceremonies in Foxborough, Mas

Tom Brady Says His Diet Is More Flexible Than Fans Think

Undervandsgruppen/YouTube

Danish Warship Wreck Discovered in Copenhagen Harbor

Google DeepMind Gemma 4

Google DeepMind Unveils Gemma 4 Open AI Model

Post Archives

More Popular from Photonews

King Charles Iinvestiture Ceremony
World

King Charles Honors Stars at Windsor Castle Ceremony Highlights

2 Min Read
US Iran nuclear talks Geneva
Top NewsWorld

US-Iran Ceasefire Prospects Raise Hopes Amid Tensions Under Scrutiny

3 Min Read
Indonesian Peacekeeper Lebanon
Top NewsWorld

Indonesian Peacekeeper Killed in Lebanon Attack

2 Min Read
Entertainment

Antonio Banderas Reflects on Hollywood Stereotyping

Antonio Banderas has opened up about Hollywood stereotyping, recalling how the industry initially limited him to…

March 28, 2026
Entertainment

Megan Thee Stallion Hospitalised During Broadway Show

Megan Thee Stallion was hospitalised on Broadway Tuesday night after she suddenly fell ill during a…

April 1, 2026
Business

Egypt Slows State Projects, Cuts Fuel Use Amid War

Egypt slows state projects, fuel cuts as the government responds to rising regional tensions linked to…

March 29, 2026
Entertainment

Oscars to Move to Peacock Theater, Stream on YouTube

The Oscars' decision in 2029 to host the ceremony on YouTube at the Peacock Theatre marks…

March 27, 2026
PhotoNews Pakistan

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Categories

  • World
  • Pakistan
  • Punjab
  • Sindh
  • Khyber Pakhtunkhwa
  • Balochistan
  • Azad Jammu Kashmir

 

  • Top News
  • Business
  • Entertainment
  • Sports
  • Videos
  • Tech
  • Offbeat
  • Blog
  • About Us
  • Privacy Policy
  • Code of Ethics & Editorial Standards

© 2026 Phototnews
All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?