Back to Articles
critical

CRITICAL: Iran's Handala Hack Breaches FBI Director's Email, Unleashes Wiper Attack on Stryker

The Iran-linked Handala Hack Team breached FBI Director Kash Patel's personal email and executed a devastating wiper attack against medical technology company Stryker. This marks the first confirmed destructive wiper operation targeting a U.S. Fortune 500 company.

By Danny Mercer, CISSP — Lead Security Analyst Mar 29, 2026
Share:

If you needed a reminder that geopolitical tensions do not stay in the political arena, here it is. The Iran-linked Handala Hack Team has just pulled off one of the most audacious cyber operations in recent memory, breaching the personal email account of FBI Director Kash Patel and simultaneously executing a devastating wiper attack against Stryker, one of America's largest medical technology companies.

The attack on Patel represents a direct strike against one of the most prominent figures in American law enforcement. According to statements the FBI shared with Reuters, the bureau confirmed that Patel's personal emails had been targeted and that necessary steps were taken to mitigate potential risks associated with the activity. The FBI was quick to note that the published data was historical in nature and involved no government information, with the leaked materials including emails from 2010 and 2019 allegedly sent by Patel. The agency characterized the leaked content as photographs and other documents, now circulating freely on the internet thanks to Handala's infrastructure of clearnet domains, Tor-hosted services, and external file-hosting platforms like MEGA.

The Stryker attack, however, tells a far more troubling story about the evolution of Iranian cyber operations. Security researchers at Flashpoint have characterized this incident as the first confirmed destructive wiper operation targeting a U.S. Fortune 500 company. Let that sink in for a moment. We have crossed a threshold where nation-state actors are not just stealing data from major American corporations but actively destroying it, wiping thousands of employee devices and deleting massive troves of company data in the process.

Stryker, which provides medical devices and services to healthcare organizations worldwide, has since issued a statement indicating that the incident is contained. The company claims it reacted quickly to not only regain access but to remove the unauthorized party from their environment by dismantling the persistence mechanisms that had been installed. According to Stryker's SEC filing and public statements, the breach was confined to its internal Microsoft environment. The threat actors used a malicious file to run commands that allowed them to conceal their actions, though Stryker emphasized that the file did not possess capabilities to spread across the network.

What makes this attack particularly concerning is the methodology. According to Palo Alto Networks Unit 42, the primary vector for recent destructive operations from Handala Hack likely involves the exploitation of identity through phishing and administrative access via Microsoft Intune. Hudson Rock has found evidence suggesting that compromised credentials associated with Microsoft infrastructure, obtained through infostealer malware, may have been used to pull off the hack. This represents a sophisticated blend of credential harvesting, social engineering, and legitimate administrative tool abuse that makes detection extraordinarily difficult.

The group behind these attacks operates under multiple personas, all traced back to Iran's Ministry of Intelligence and Security. The cybersecurity community tracks them under various names including Banished Kitten, Cobalt Mystique, Red Sandstorm, and Void Manticore. Handala Hack itself appears to have replaced an earlier persona called Karma since late 2023, and the group also operates under the name Homeland Justice when targeting Albanian entities. Research from Check Point reveals that Handala has consistently targeted IT and service providers in an effort to obtain credentials, relying largely on compromised VPN accounts for initial access. Over recent months, researchers identified hundreds of logon and brute-force attempts against organizational VPN infrastructure linked to Handala-associated systems.

The tactics employed by Handala in these attacks showcase a mature and dangerous operational capability. The group uses RDP for lateral movement and initiates destructive operations by dropping wiper malware families such as Handala Wiper and Handala PowerShell Wiper through Group Policy logon scripts. They also leverage legitimate disk encryption utilities like VeraCrypt to complicate recovery efforts. Unlike financially motivated cybercriminal groups, Handala-associated activity has historically emphasized disruption, psychological impact, and geopolitical signaling. Operations attributed to the group frequently align with periods of heightened geopolitical tension and often target organizations with symbolic or strategic value.

The timing of these attacks is no coincidence. They come against the backdrop of escalating U.S.-Israel-Iran tensions that have prompted Iran to launch a retaliatory cyber offensive against Western targets. The leak of Patel's personal emails appears to be a direct response to a court-authorized operation that led to the seizure of four domains operated by MOIS since 2022. The U.S. government has also announced a ten million dollar reward for information on members of the group. The seized domains include justicehomeland.org, handala-hack.to, karmabelow80.org, and handala-redwanted.to.

According to the Department of Justice, these domains were used by MOIS in furtherance of attempted psychological operations targeting adversaries of the regime by claiming credit for hacking activity, posting sensitive data stolen during such hacks, and calling for the killing of journalists, regime dissidents, and Israeli individuals. The leaked materials included names and sensitive information of approximately 190 individuals associated with the Israeli Defense Force and Israeli government, along with 851 gigabytes of confidential data from members of the Sanzer Hasidic Jewish community. An email address linked to the group has allegedly been used to send death threats to Iranian dissidents and journalists living in the United States and elsewhere.

In response to these events, both Microsoft and CISA have released guidance on hardening Windows domains and fortifying Intune to defend against similar attacks. The recommendations include using the principle of least privilege, enforcing phishing-resistant multi-factor authentication, and enabling multi-admin approval in Intune for sensitive changes. These are not optional best practices anymore. They represent the minimum viable security posture for any organization that does not want to become the next headline.

Flashpoint has characterized the attack on Stryker as marking a dangerous shift in supply chain threats. State-linked cyber activity targeting critical suppliers and logistics providers can have cascading impacts across entire ecosystems, and the healthcare sector represents a particularly attractive target given its combination of critical infrastructure status and historically weaker security postures. The implications extend far beyond Stryker itself to every healthcare organization in its supply chain and every patient who depends on its products and services.

The FBI has revealed additional intelligence about Handala's operational methods in a separate advisory. The group and other MOIS cyber actors have employed social engineering tactics to engage with prospective victims on social messaging applications to deliver Windows malware capable of enabling persistent remote access using a Telegram bot. They masquerade first-stage payloads as commonly used programs like Pictory, KeePass, Telegram, or WhatsApp. Using Telegram as command and control infrastructure allows malicious activity to hide among normal network traffic and significantly reduces the likelihood of detection. Analysis of malware artifacts found on compromised devices has revealed capabilities to record audio and screen while Zoom sessions are active. These attacks have primarily targeted dissidents, opposition groups, and journalists.

Perhaps most troubling is the increasing integration between Iranian state actors and the broader cybercrime ecosystem. Handala has integrated the Rhadamanthys stealer into its operations, while MuddyWater has adopted the Tsundere botnet and Fakeset downloader. This engagement offers a dual advantage. It enhances operational capabilities through access to mature criminal tooling and resilient infrastructure while complicating attribution and contributing to recurring confusion around Iranian threat activity. Check Point notes that the use of such tools has created significant confusion, leading to misattribution and flawed pivoting, and clustering together activities that are not necessarily related.

Handala Hack has already resurfaced on a new clearnet domain, handala-team.to, where it described the domain seizures as desperate attempts by the United States and its allies to silence the voice of Handala. This defiance signals that we should expect continued and potentially escalating operations from this group in the weeks and months ahead.

The ongoing conflict has prompted fresh warnings that critical infrastructure sector operators risk becoming lucrative targets. A surge in DDoS attacks, website defacements, and hack-and-leak operations against Israel and Western organizations has already materialized. Hacktivist entities have engaged in psychological and influence operations aimed at sowing fear and confusion among targeted populations. A relatively new group called Nasir Security has been observed targeting the energy sector in the Middle East, attacking supply chain vendors involved in engineering, safety, and construction.

For organizations watching these developments, the message is clear. The distinction between nation-state espionage and destructive cyber warfare has collapsed. Iranian actors are no longer content with stealing secrets. They are actively destroying data, disrupting operations, and targeting the personal lives of government officials. Your organization's Microsoft environment, VPN infrastructure, and identity management systems are the front lines of this conflict whether you realize it or not.

The question is not whether your organization could be targeted but whether you have the defenses in place to survive when it happens. Review your Intune configurations. Enable multi-admin approval. Implement phishing-resistant MFA everywhere. And assume that your credentials have already been compromised by infostealer malware, because statistically speaking, they probably have.

References

Concerned about this threat?

Our security team can assess your exposure and recommend immediate actions.

Get a Free Assessment →