LmCast :: Stay tuned in

FBI warns of Handala hackers using Telegram in malware attacks

Recorded: March 23, 2026, 10 a.m.

Original Summarized

FBI warns of Handala hackers using Telegram in malware attacks

News

Featured
Latest

Trivy vulnerability scanner breach pushed infostealer via GitHub Actions

Microsoft Azure Monitor alerts abused for callback phishing attacks

Musician admits to $10M streaming royalty fraud using AI bots

FBI links Signal phishing attacks to Russian intelligence services

Varonis Atlas: Securing AI and the Data That Powers It

Microsoft Exchange Online service change causes email access issues

Block ads and trackers on 9 devices for only $16 in this deal

FBI warns of Handala hackers using Telegram in malware attacks

Tutorials

Latest
Popular

How to access the Dark Web using the Tor Browser

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

How to use the Windows Registry Editor

How to backup and restore the Windows Registry

How to start Windows in Safe Mode

How to remove a Trojan, Virus, Worm, or other Malware

How to show hidden files in Windows 7

How to see hidden files in Windows

Webinars
Downloads

Latest
Most Downloaded

Qualys BrowserCheck

STOPDecrypter

AuroraDecrypter

FilesLockerDecrypter

AdwCleaner

ComboFix

RKill

Junkware Removal Tool

Deals

Categories

eLearning

IT Certification Courses

Gear + Gadgets

Security

VPNs

Popular

Best VPNs

How to change IP address

Access the dark web safely

Best VPN for YouTube

Forums
More

Virus Removal Guides
Startup Database
Uninstall Database
Glossary
Send us a Tip!
Welcome Guide

HomeNewsSecurityFBI warns of Handala hackers using Telegram in malware attacks

FBI warns of Handala hackers using Telegram in malware attacks

By Sergiu Gatlan

March 23, 2026
05:45 AM
0

The U.S. Federal Bureau of Investigation (FBI) warned network defenders that Iranian hackers linked to the country's Ministry of Intelligence and Security (MOIS) are using Telegram in malware attacks.
In a flash alert issued on Friday, the FBI says Telegram is being used as command-and-control (C2) infrastructure by malware targeting journalists criticizing the Iranian government, Iranian dissidents, and various other oppositional groups worldwide.
The bureau linked these attacks to the Iranian-linked and pro-Palestinian Handala hacktivist group (also known as Handala Hack Team, Hatef, Hamsa) and the Iranian state-sponsored Homeland Justice threat group tied to Iran's Islamic Revolutionary Guard Corps (IRGC).
In these attacks, the Iranian hackers are using social engineering to infect targets' devices with Windows malware that enables them to exfiltrate screenshots or files from compromised computers.
"Due to the elevated geopolitical climate of the Middle East and current conflict, the FBI is highlighting this MOIS cyber activity," the bureau said.
"This malware resulted in intelligence collection, data leaks, and reputational harm against the targeted parties. The FBI is releasing this information to maximize awareness of malicious Iranian cyber activity and provide mitigation strategies to reduce the risk of compromise."

Iranian malware attacks abusing Telegram (FBI)
This warning was published one day after the FBI seized four domains (handala-redwanted[.]to, handala-hack[.]to, justicehomeland[.]org, and karmabelow80[.]org).
The websites available via the seized clearnet domains were used by the Handala and Homeland Justice threat groups, and a third threat actor tracked as Karma Below, during their attacks and to leak sensitive documents and data stolen in cyberattacks targeting victims in the United States and around the world.
These actions follow Handala's cyberattack on U.S. medical giant Stryker, in which they factory reset approximately 80,000 devices (including employees' personal computers and mobile devices managed by the company) using the Microsoft Intune wipe command after compromising a Windows domain administrator account and creating a new Global Administrator account.
Last week, the FBI also warned that Russian intelligence-linked threat actors are targeting Signal and WhatsApp users in phishing campaigns that have already compromised thousands of accounts.
"The activity targets individuals of high intelligence value, such as current and former U.S. government officials, military personnel, political figures, and journalists," said the FBI  in a public service announcement issued after Dutch and French cybersecurity authorities described similar account-hijacking operations.

Red Report 2026: Why Ransomware Encryption Dropped 38%
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
Download The Report

Related Articles:
FBI seizes Handala data leak site after Stryker cyberattackFBI seeks victims of Steam games used to spread malwareMedtech giant Stryker offline after Iran-linked wiper malware attackGoogle adds ‘Advanced Flow’ for safe APK sideloading on AndroidFBI links Signal phishing attacks to Russian intelligence services

C2
FBI
Handala
Iran
Malware
Telegram

Sergiu Gatlan
Sergiu is a news reporter who has covered the latest cybersecurity and technology developments for over a decade. Email or Twitter DMs for tips.

Previous Article
Next Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Popular Stories

Microsoft: March Windows updates break Teams, OneDrive sign-ins

CISA orders feds to patch max-severity Cisco flaw by Sunday

Microsoft Azure Monitor alerts abused for callback phishing attacks

Sponsor Posts

Secure your AI agents without sacrificing speed.

Overdue a password health-check? Audit your Active Directory for free

Are refund fraud methods targeting your brand? You can monitor the underground for these threats.

AI is a data-breach time bomb: Read the new report

Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast.

Follow us:

Main Sections

News
Webinars
VPN Buyer Guides
SysAdmin Software Guides
Downloads
Virus Removal Guides
Tutorials
Startup Database
Uninstall Database
Glossary

Community

Forums
Forum Rules
Chat

Useful Resources

Welcome Guide
Sitemap

Company

About BleepingComputer
Contact Us
Send us a Tip!
Advertising
Write for BleepingComputer
Social & Feeds
Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now


Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert detailing a significant escalation in cyber activity attributed to Iranian actors, specifically the Handala hacktivist group and the Homeland Justice threat group linked to Iran’s Islamic Revolutionary Guard Corps (IRGC). This warning centers on the group’s utilization of Telegram as command-and-control (C2) infrastructure for deploying malware targeting journalists, Iranian dissidents, and other oppositional groups globally. The FBI’s motivation for this alert stems from the heightened geopolitical environment in the Middle East coupled with ongoing conflict, seeking to increase awareness of malicious Iranian cyber activity and to provide mitigation strategies to reduce the risk of compromise.

The operation involves social engineering tactics employed to infect devices with Windows malware capable of capturing screenshots or files from compromised computers. Following this initial breach, the malware facilitates the exfiltration of sensitive digital assets. The FBI’s action follows the seizure of four domains – handala-redwanted[.]to, handala-hack[.]to, justicehomeland[.]org, and karmabelow80[.]org – utilized by the Handala and Homeland Justice threat groups, alongside a third actor identified as Karma Below. These domains served as platforms for leaking documents and data obtained from cyberattacks targeting individuals and organizations in the United States and internationally. Notably, this activity follows Handala’s previously publicized cyberattack on Stryker, a U.S. medical giant, which involved the factory resetting of approximately 80,000 devices – encompassing employee personal computers and mobile devices – utilizing the Microsoft Intune wipe command following the compromise of a Windows domain administrator account.

The FBI’s alert underscores a broader trend of state-sponsored actors leveraging communication platforms for malicious purposes. It mirrors earlier warnings regarding Russian intelligence-linked threats targeting Signal and WhatsApp accounts, aimed at compromising users of high intelligence value including government officials, military personnel, and journalists. This coordinated campaign highlights the evolving sophistication of cyberattacks and the need for robust security measures across various digital ecosystems. The Handala group's tactics—demonstrated most notably through the Stryker attack—represent a calculated approach leveraging vulnerabilities to inflict significant reputational and operational damage. Ultimately, the FBI’s action reinforces the importance of vigilance and proactive defense against state-sponsored cyberattacks globally.