Photonews Logo Photonews logo
  • Home
  • Pakistan
    • Punjab
    • Sindh
    • Khyber Pakhtunkhwa
    • Azad Jammu Kashmir
    • Balochistan
    • Gilgit – Baltistan
  • World
  • Business
  • Entertainment
  • Videos
    Zayn Malik
    Videos

    Zayn Malik Releases Die For Me Music Video Ahead of New Album

    February 6, 2026 3 Min Read
    Masters of the Universe teaser
    Videos

    Masters of the Universe Teaser Reveals Nicholas Galitzine as He-Man

    January 22, 2026 3 Min Read
    Bridgerton Season 4 trailer
    EntertainmentVideos

    Bridgerton Season 4 Trailer Reveals Benedict’s Love Story

    December 26, 2025 2 Min Read
  • Sports
  • Technology
  • Offbeat
  • Blog
  • Contact
Reading: How does the Handala Hacking Group Carry Out Attacks?
PhotoNews PakistanPhotoNews Pakistan
Font ResizerAa
Search
  • Home
  • Pakistan
    • Punjab
    • Sindh
    • Khyber Pakhtunkhwa
    • Balochistan
    • Azad Jammu Kashmir
    • Gilgit – Baltistan
  • World
  • Business
  • Entertainment
  • Videos
  • Sports
  • Technology
  • Offbeat
  • Blog
  • Contact
Have an existing account? Sign In
Follow US
© 2022 Photonews. All Rights Reserved.
Hands typing on a laptop with an Iran-flag graphic on the screen, representing cyber hacking activity.
PhotoNews Pakistan > Offbeat > How does the Handala Hacking Group Carry Out Attacks?
Offbeat

How does the Handala Hacking Group Carry Out Attacks?

Web Desk
By Web Desk Published March 11, 2026 2 Min Read
Share
Hands typing on a laptop beneath a flag graphic, illustrating suspected cyber activity linked to the Handala hacking group. Image Credit: X
SHARE

Handala is a self-described pro-Palestinian cyber persona that has claimed responsibility for recent attacks targeting Stryker and the Academy of the Hebrew Language. Reporting on the Stryker incident said the group’s logo appeared on login pages, though some details of the attack remained under investigation.

Security researchers say Handala is more than a loose online brand. CrowdStrike identifies Handala Hack Team as a persona used by BANISHED KITTEN, an Iran-nexus adversary with links to Iran’s Ministry of Intelligence and Security, while Check Point describes Handala as one of the online identities associated with Void Manticore, another Iran-linked designation for the same activity cluster.

According to Check Point, the group focuses on disruption, data leaks, and psychological pressure. Its operations are designed not only to breach systems but also to create reputational damage by timing leaks and public claims for maximum impact.

The Handala Hacking Group: We declare to the world that, in retaliation for the brutal attack on the Minab school and in response to the ongoing cyber attacks against the resistance axis's infrastructure, our major cyber operation has been successfully completed. Striker…

— CGTN Africa (@cgtnafrica) March 11, 2026

Handala Hacking Group Explained Through Its Tactics

Threat intelligence reporting says Handala often relies on phishing and other intrusion methods to gain access, then combines that access with destructive activity. Check Point said Void Manticore has used custom wiper malware in attacks tied to its online personas, while outside tracking sources describe Handala as a destructive actor rather than a typical profit-driven ransomware group.

🚨 NEW: The hacker group “Handala” claims to have breached Persian-language communication networks linked to the Israeli military and obtained contact numbers and personal details of alleged informants operating in countries aligned with Iran’s “Axis of Resistance.”

➤… pic.twitter.com/eZuQLHAUco

— Drop Site (@DropSiteNews) March 6, 2026

The group also tries to make its tools harder to block. The source content says Handala has used file-sharing services such as Mega and Storj to host malicious payloads, a tactic that aligns with broader threat reporting describing flexible delivery methods and information operations.

Its name carries political symbolism as well. Handala is derived from the well-known Palestinian cartoon character created by Naji al-Ali in 1969, which helps present the cyber persona as a resistance symbol while security firms assess it as part of a state-linked influence and disruption effort.

TAGGED:Featured
Share This Article
Facebook Twitter Pinterest Whatsapp Whatsapp LinkedIn Email Copy Link Print
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Advertisement

Recent Posts

Android phones security update risk

Google Targets Back Button Hijacking With Search Penalties

Patrick Mahomes Kansas City Chiefs

Patrick Mahomes Injury Recovery Update After New Scar Photo

Claude Code security vulnerabilities

Claude AI Outage on April 15 Disrupts Chat, Code and Login

Post Archives

More Popular from Photonews

Virgin Atlantic
Business

Virgin Atlantic Ticket Prices Rise Amid Jet Fuel Crisis

3 Min Read
PM Benjamin Netanyahu Marks 'The New Middle East' on Map During UN General Assembly Address September 22, 2023.
World

Netanyahu Seeks Delay in Corruption Trial Testimony

3 Min Read
Ishaq Dar
Pakistan

Ishaq Dar Reviews Fuel Supply, Subsidy and Austerity Measures

2 Min Read
Business

PSX Rally Today Pushes KSE-100 Above 165,000

PSX rally today gathered pace on Tuesday, April 14, 2026, as the KSE-100 Index surged well…

April 14, 2026
Business

UK pauses Chagos Islands Deal After US Opposition

The Chagos Islands deal, paused by Britain, has reopened debate over sovereignty, military strategy and the rights of displaced…

April 11, 2026
Top NewsWorld

Lebanon-Israel Peace Talks Mark Rare Diplomatic Breakthrough

The Lebanon-Israel peace talks hosted by the United States on Tuesday marked a rare moment of…

April 15, 2026
Sports

Why Lionel Messi Has Not Confirmed the Next World Cup

Lionel Messi has not yet confirmed whether he will play in the next World Cup, even…

April 11, 2026
PhotoNews Pakistan

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Categories

  • World
  • Pakistan
  • Punjab
  • Sindh
  • Khyber Pakhtunkhwa
  • Balochistan
  • Azad Jammu Kashmir

 

  • Top News
  • Business
  • Entertainment
  • Sports
  • Videos
  • Tech
  • Offbeat
  • Blog
  • About Us
  • Privacy Policy
  • Code of Ethics & Editorial Standards

© 2026 Phototnews
All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?