DOJ Targets Iran’s Shadowy Cyber Front: Four Websites Seized in Crackdown on Threats and Hacks

Posted on

DOJ says it shut down websites that threatened dissidents and took credit for hacks

Food News

Image Credits: Wikimedia; licensed under CC BY-SA 3.0.

Difficulty

Prep time

Cooking time

Total time

Servings

Author

Sharing is caring!

DOJ says it shut down websites that threatened dissidents and took credit for hacks

A Network of Fake Hacktivists Exposed (Image Credits: Unsplash)

Washington – The U.S. Justice Department seized four domains operated by Iran’s Ministry of Intelligence and Security, halting platforms that boasted about cyberattacks and targeted critics with threats. Officials described the sites as central to psychological operations designed to intimidate dissidents, dox Israelis, and spread propaganda amid escalating tensions.[1][2] The action, announced on March 19, 2026, underscores efforts to counter Iran’s use of cyberspace for transnational repression following the U.S.-Iran conflict that began late February.

A Network of Fake Hacktivists Exposed

The domains – justicehomeland.org, handala-hack.to, karmabelow80.org, and handala-redwanted.to – functioned under the guise of the “Handala Hack” persona, a fabricated hacktivist group controlled by Iranian intelligence.[1] Investigators linked them through shared Iranian IP ranges, operational tactics, and leak sites. These platforms amplified stolen data dumps and menacing messages to create fear among targets.

Authorities obtained court authorization for the seizures based on affidavits detailing the connections.The DOJ announcement highlighted how the sites supported destructive hacks and harassment campaigns. The FBI Baltimore Field Office led the probe, coordinating with cyber specialists.

Domain Primary Activities
handala-hack.to Claimed malware attack on U.S. medical firm; doxxed Israeli personnel
handala-redwanted.to Posted threats and PII of IDF affiliates
justicehomeland.org Bragged about Albanian government hack (2022)
karmabelow80.org Shared stolen Albanian data; general propaganda

Cyberattacks from Medical Devices to Government Servers

Iran-linked actors used the sites to publicize a destructive malware strike against Stryker, a U.S. multinational medical technologies company. The assault disrupted internal systems worldwide but spared patient-facing products like implants.[2] Handala claimed the hit as revenge for alleged U.S.-backed actions against Iran.

Earlier boasts included a 2022 breach of Albanian government networks, where sensitive documents like ID cards surfaced online. The operation targeted Albania for hosting the Mujahedeen e-Khalq, an Iranian opposition group.[1] Another dump involved 851 gigabytes from the Sanzer Hasidic Jewish community, exposing financial records and private correspondences.

  • Malware on Stryker: March 11, 2026 claim.
  • IDF doxxing: Names and data of about 190 individuals posted March 9.
  • Sanzer data theft: Threatened further releases with warnings of no safe havens.
  • Albanian hacks: July and September 2022 incidents.

Death Threats and Bounties Reach Dissidents

The platforms extended beyond hacks to personal intimidation. Emails from handala_team@outlook.com delivered death threats to Iranian journalists and dissidents in the U.S. and elsewhere, often doxxing home addresses.[3] One message offered a $250,000 bounty for the beheading of former Ontario MPP Goldie Ghamari, directing Mexico’s Jalisco New Generation Cartel to her Ottawa residence.

Israeli targets faced similar harassment, with posts claiming surveillance of devices like iPhones and urging violence against “Zionist pigs.” The operations aimed to silence regime critics and stoke fear in diaspora communities. DOJ officials noted the blend of cyber theft and real-world incitement as a hallmark of MOIS tactics.

Officials Pledge Sustained Pressure

FBI Director Kash Patel declared, “Iran thought they could hide behind fake websites and keyboard threats to terrorize Americans and silence dissidents. We took down four of their operation’s pillars and we’re not done.”[1] Attorney General Pamela Bondi emphasized the role of such sites in inciting violence, vowing cyber vigilance.

Assistant Attorney General for National Security John A. Eisenberg called Iran the leading state sponsor of terrorism, committing to dismantle its cyber infrastructure. The seizures form part of broader countermeasures since the February 28 conflict onset, amid warnings of Iranian retaliation against U.S. firms.

Key Takeaways

  • Four domains seized, crippling MOIS-linked psych ops.
  • Hacks hit U.S. medical giant, Albanian gov, Jewish community.
  • Threats included $250k bounties and doxxing of 190+ Israelis.

This disruption signals U.S. resolve against hybrid threats blending hacks and terror. As investigations continue, the focus remains on protecting dissidents and critical sectors. What do you think about these cyber tactics? Tell us in the comments.

Author

Tags:

You might also like these recipes

Leave a Comment