Following recent escalations in military conflict, Iran’s cyber capabilities have moved into a new phase. A previously obscure hacking group known as “Handala” has claimed responsibility for a large-scale breach of Stryker, a US-based medical technology firm, crippling its global operations. This attack is the first major cyber offensive from Iran in response to air strikes targeting the country, signaling a shift towards disruptive cyber warfare.
From Hacktivism to State-Sponsored Chaos
Handala, named after the iconic Palestinian cartoon character, has historically operated in the shadows, initially gaining little recognition within the cybersecurity community. However, experts now believe the group functions as a front for Iran’s Ministry of Intelligence (MOIS). They blend hacktivist rhetoric with destructive capabilities, exploiting political tensions to inflict damage on adversaries. The group has previously targeted Albania, Israel, and other entities, often publishing stolen data or deploying wiper malware.
Escalation Under Pressure
As Iran faces growing military pressure, its hackers, especially Handala, are likely operating with increased urgency and broader authorization. Sergey Shykevich of Check Point notes that the group is “all in,” exploiting existing network footholds to carry out destructive attacks. Handala has become the “main face” of Iranian cyber retaliation, claiming over a dozen victims since the recent outbreak of conflict.
Strategic Uncertainty
While Handala claims significant victories, security researchers warn against overestimating their strategic depth. Rafe Pilling of Sophos X-Ops suggests the group is likely exploiting opportunities as they arise rather than executing a meticulously planned campaign. This opportunistic approach involves quick access and maximum damage, focusing on targets in Israel and the US to demonstrate retaliatory action.
Evolution and Tactics
Emerging in late 2023 following Hamas’ attacks on Israel, Handala initially presented itself as a pro-Palestinian hacktivist group. However, its actions align with Iranian interests. They promote attacks on Telegram and X, using Starlink to bypass censorship, and leverage psychological warfare through hack-and-leak operations. The group has also used destructive malware, including Coolwipe, Chillwipe, and Bibiwiper, to inflict “real operational pain.”
Broader State Sponsorship
Check Point has linked Handala to a larger state-sponsored hacking network known as Void Manticore, which has operated under multiple aliases, including Red Sandstorm and Cobalt Mystique. This group was previously linked to attacks on Albania in 2022, motivated by the Iranian regime’s efforts to remove opposition groups from the country. Following the war in Gaza, Void Manticore created Handala to target Israeli entities under the guise of pro-Palestinian activism.
The Stryker Breach
Handala’s latest operation, the breach of Stryker, may be its most impactful yet. The group claims the attack was retaliation for the company’s ties to Israel, including acquisitions and US military contracts. While the true motivation remains unclear, Shykevich suggests Handala exploited an opportunity rather than executing a calculated plan.
Ultimately, Handala’s aggressive tactics reflect Iran’s willingness to escalate cyber warfare as a means of retaliation. The group’s chaotic but destructive approach poses a significant threat to Western infrastructure, particularly in the context of ongoing military conflict.




















