
A Network of Fake Hacktivists Exposed (Image Credits: Unsplash)
Washington – The U.S. Justice Department seized four domains operated by Iran’s Ministry of Intelligence and Security, halting platforms that boasted about cyberattacks and targeted critics with threats. Officials described the sites as central to psychological operations designed to intimidate dissidents, dox Israelis, and spread propaganda amid escalating tensions.[1][2] The action, announced on March 19, 2026, underscores efforts to counter Iran’s use of cyberspace for transnational repression following the U.S.-Iran conflict that began late February.
A Network of Fake Hacktivists Exposed
The domains – justicehomeland.org, handala-hack.to, karmabelow80.org, and handala-redwanted.to – functioned under the guise of the “Handala Hack” persona, a fabricated hacktivist group controlled by Iranian intelligence.[1] Investigators linked them through shared Iranian IP ranges, operational tactics, and leak sites. These platforms amplified stolen data dumps and menacing messages to create fear among targets.
Authorities obtained court authorization for the seizures based on affidavits detailing the connections.The DOJ announcement highlighted how the sites supported destructive hacks and harassment campaigns. The FBI Baltimore Field Office led the probe, coordinating with cyber specialists.
| Domain | Primary Activities |
|---|---|
| handala-hack.to | Claimed malware attack on U.S. medical firm; doxxed Israeli personnel |
| handala-redwanted.to | Posted threats and PII of IDF affiliates |
| justicehomeland.org | Bragged about Albanian government hack (2022) |
| karmabelow80.org | Shared stolen Albanian data; general propaganda |
Cyberattacks from Medical Devices to Government Servers
Iran-linked actors used the sites to publicize a destructive malware strike against Stryker, a U.S. multinational medical technologies company. The assault disrupted internal systems worldwide but spared patient-facing products like implants.[2] Handala claimed the hit as revenge for alleged U.S.-backed actions against Iran.
Earlier boasts included a 2022 breach of Albanian government networks, where sensitive documents like ID cards surfaced online. The operation targeted Albania for hosting the Mujahedeen e-Khalq, an Iranian opposition group.[1] Another dump involved 851 gigabytes from the Sanzer Hasidic Jewish community, exposing financial records and private correspondences.
- Malware on Stryker: March 11, 2026 claim.
- IDF doxxing: Names and data of about 190 individuals posted March 9.
- Sanzer data theft: Threatened further releases with warnings of no safe havens.
- Albanian hacks: July and September 2022 incidents.
Death Threats and Bounties Reach Dissidents
The platforms extended beyond hacks to personal intimidation. Emails from handala_team@outlook.com delivered death threats to Iranian journalists and dissidents in the U.S. and elsewhere, often doxxing home addresses.[3] One message offered a $250,000 bounty for the beheading of former Ontario MPP Goldie Ghamari, directing Mexico’s Jalisco New Generation Cartel to her Ottawa residence.
Israeli targets faced similar harassment, with posts claiming surveillance of devices like iPhones and urging violence against “Zionist pigs.” The operations aimed to silence regime critics and stoke fear in diaspora communities. DOJ officials noted the blend of cyber theft and real-world incitement as a hallmark of MOIS tactics.
Officials Pledge Sustained Pressure
FBI Director Kash Patel declared, “Iran thought they could hide behind fake websites and keyboard threats to terrorize Americans and silence dissidents. We took down four of their operation’s pillars and we’re not done.”[1] Attorney General Pamela Bondi emphasized the role of such sites in inciting violence, vowing cyber vigilance.
Assistant Attorney General for National Security John A. Eisenberg called Iran the leading state sponsor of terrorism, committing to dismantle its cyber infrastructure. The seizures form part of broader countermeasures since the February 28 conflict onset, amid warnings of Iranian retaliation against U.S. firms.
Key Takeaways
- Four domains seized, crippling MOIS-linked psych ops.
- Hacks hit U.S. medical giant, Albanian gov, Jewish community.
- Threats included $250k bounties and doxxing of 190+ Israelis.
This disruption signals U.S. resolve against hybrid threats blending hacks and terror. As investigations continue, the focus remains on protecting dissidents and critical sectors. What do you think about these cyber tactics? Tell us in the comments.


