Skip to content

Pro-Iranian threat actor Handala – new websites

  • by

While the US DOJ continues its enforcement action against the pro-Iranian Handala threat actor group, new websites (or previously dormant ones) activate within less than 48h.

This illustrates how difficult it is to counter online psy-op websites content – especially when their infrastructure uses “bulletproof hosting” in non-compliant or overtly hostile jurisdictions. Or simply anonymous – or by proxy -registration on European servers, which still might take several days before they get detected, reported and taken down.

These sites are being used not only for propaganda purposes, but also to leak various types of data or to dox individuals. Despite takedowns as a result of abuse reporting or law enforcement action, Handala wesbites quickly reappear under new top level domains (.to being the current favourite – .to is the country code top-level domain for the Kingdom of Tonga).

handala hack defacement osint
Example Handala defacement graphics found on a victim website

ACTIVE HANDALA WEBSITES - March 2026

BACKUP DOMAINS / REDIRECTS:

  • https://handala-hack[.]ps
  • https://handala[.]to
  • http://handala-hack[.]to (now seized by the FBI)
  • https://handala-redwanted[.]to (now seized by the FBI)
  • Tor website: http://vmjfieomxhnfjba57sd6jjws2ogvowjgxhhfglsikqvvrnrajbmpxqqd.onion

Handala operates and behaves more like a hacktivist collective rather than an APT actor, so it is likely than the next wave of attacks will be directed against entities listed on the so called “Tasnim News list”.

Basically, this was a list of “enemy technology infrastructure” targets, identified in a tweet by Tasnim News, an IRGC affiliated propaganda outlet. The list contains 7 names and 30 locations of facilities located in the region, in relatively close proximity to Iran. The companies are Microsoft, Nvidia, Amazon, Google, Oracle, IBM, and Palantir.

NOTE: More Handala websites might be added to the above dataset in the near future, should they emerge.

Leave a Reply

Your email address will not be published. Required fields are marked *