Threat IntelHIGH

Handala Claims Major Breach of Three UAE Organizations

Featured image for Handala Claims Major Breach of Three UAE Organizations
#Handala#UAE#cyberattack#data breach#Iran

Original Reporting

SASecurity Affairs·Pierluigi Paganini

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupHandala
AliasesVoid Manticore
AttributionIran-backed
Target SectorsGovernment
Target RegionsUAE
Active Since
Campaign NameUAE Cyberattack
Primary TTPsPhishing, Data Theft, Wiper Attacks
Tools Used
MITRE ATT&CK
MotivationPolitical Retaliation
🎯

Basically, a group linked to Iran says they hacked three big organizations in the UAE and stole a lot of data.

Quick Summary

Iran-linked group Handala claims to have breached three major UAE organizations, stealing vast amounts of data. This attack raises significant security concerns for the region.

What Happened

The Iran-linked group Handala has claimed responsibility for a significant cyberattack against three major organizations in the United Arab Emirates (UAE): the Dubai Courts Department, the Dubai Land Department, and the Dubai Roads and Transport Authority. They allege that during this operation, they destroyed 6 petabytes of data and stole 149 terabytes of sensitive information. This attack is framed as a response to perceived betrayals by UAE leaders and serves as a warning to other governments in the region.

Who's Behind It

Handala, often viewed as a pro-Palestinian hacktivist group, is believed to operate as a front for the Iranian-backed group Void Manticore. Known for their aggressive tactics, they have previously targeted Israeli military servers and other organizations, engaging in data theft, extortion, and destructive attacks. Their recent activities have intensified amidst the ongoing conflict involving Iran, showcasing their capabilities in cyber warfare.

Tactics & Techniques

The group has been involved in various forms of cyberattacks, including:

  • Phishing campaigns to gain initial access.
  • Data exfiltration and destructive wiper attacks to erase data.
  • Psychological operations aimed at instilling fear and uncertainty.

In a notable incident earlier this month, Handala claimed to have breached PSK Wind Technologies, an Israeli firm, and wiped out significant amounts of data from their systems. Their tactics are characterized by a blend of information warfare and destructive cyber operations.

Defensive Measures

Organizations in the UAE and beyond should take immediate steps to bolster their cybersecurity posture. This includes:

  • Regularly updating software and systems to patch vulnerabilities.
  • Implementing robust access controls and monitoring for unusual activities.
  • Training employees on recognizing phishing attempts and other social engineering tactics.

As tensions continue to rise in the region, the potential for further cyberattacks remains high. Organizations must remain vigilant and prepared for possible retaliatory actions from groups like Handala.

🔍 How to Check If You're Affected

  1. 1.Review access logs for unusual login attempts.
  2. 2.Check for unauthorized data transfers or deletions.
  3. 3.Ensure all systems are updated with the latest security patches.

🏢 Impacted Sectors

Government

Pro Insight

🔒 Pro insight: Handala's actions reflect a strategic escalation in cyber warfare tactics linked to regional geopolitical tensions.

Sources

Original Report

SASecurity Affairs· Pierluigi Paganini
Read Original

Related Pings

MEDIUMThreat Intel

Detecting Cybercriminal Activity - Insights from Research

A new research project aims to detect cybercrime on Telegram using AI. This could help authorities track illegal activities on the platform. Understanding these threats is vital for cybersecurity.

Intel 471 Blog·
HIGHThreat Intel

FBI's Group 78 - Covertly Disrupting Ransomware Groups

The FBI's secret Group 78 is reportedly using covert tactics against ransomware groups like Black Basta. This has raised tensions with European law enforcement agencies. The fight against ransomware is intensifying, but cooperation is key.

Intel 471 Blog·
HIGHThreat Intel

Venice San Marco Flood Pumps - Hackers Claim Control

Hackers have claimed control over Venice's flood defense system, threatening to flood coastal areas. This incident reveals serious vulnerabilities in critical infrastructure security. Authorities are urged to enhance protections to prevent potential disasters.

Security Affairs·
HIGHThreat Intel

Security Affairs Newsletter - Highlights on Cyber Threats

The latest Security Affairs newsletter reveals critical threats including Iranian APTs targeting U.S. devices and a ransomware attack on healthcare services. Stay informed about the evolving cyber landscape.

Security Affairs·
MEDIUMThreat Intel

Cyberattack Anatomy - Understanding the Full Kill Chain

A new podcast episode reveals how cyberattacks unfold from start to finish. Learn about the tactics used by attackers and how organizations can better prepare. This insightful discussion emphasizes the importance of incident readiness and resilience.

CyberWire Daily·
HIGHThreat Intel

Linux Threat Landscape - Rising Cross-Platform Attacks Explained

The Linux threat landscape is changing, with ransomware and nation-state actors increasingly targeting Linux systems. Understanding these threats is vital for security.

Huntress Blog·