Iranian Hacking Group 'Handala' Re-Emerges a Day After US Seizes Domains
In a swift and defiant move, the Iranian government-linked hacking group known as the Handala Hack Team has re-established its online presence just one day after the FBI and Department of Justice (DOJ) seized four of its domains. This group, which claimed responsibility for a significant cyberattack on US medical device giant Stryker on March 11, 2026, demonstrated its resilience despite the US government's efforts to disrupt its operations.
US Seizure of Handala Domains
On March 19, the DOJ announced the seizure of four internet domains associated with the Handala Hack Team. These domains were identified as Justicehomeland[.Jorg, Handala-Hack[.Jto, Karmabelow80|.Jorg, and Handala-Redwanted[.Jto. According to the official announcement, the domains were used by Iran's Ministry of Intelligence and Security (MOIS) in psychological operations targeting adversaries of the regime. This included claiming credit for hacking activities, posting sensitive stolen data, and calling for violence against journalists, dissidents, and Israeli individuals.
A partially redacted FBI affidavit filed in support of the seizure referenced the March 11 cyberattack on Stryker, describing it as an attack on a major American multinational medical technologies firm. The affidavit quoted messages posted by Handala announcing the attack. A DOJ spokesperson told Reuters that the FBI affidavit asserts probable cause to believe the operators of the Handala persona are part of a conspiracy that carried out a destructive malware attack against the US-based company.
Handala's Response to the Seizures
In a post on its website on Friday, March 20, Handala responded to the domain seizures, labeling them as desperate attempts by the United States and its allies to silence its voice. This statement underscores the group's ongoing defiance and its commitment to maintaining its online propaganda and operational capabilities despite law enforcement actions.
Cybersecurity Experts Weigh In
For cybersecurity experts, Handala's rapid return was not surprising. Ari Ben Am, an adjunct fellow at the Foundation for Defense of Democracies Center on Cyber and Technology Innovation, noted that Iranian threat actors, particularly MOIS, are accustomed to takedowns. He explained that Handala alone has had numerous Telegram channels, X accounts, and domains taken down in the past, yet these actions have never significantly slowed its activities.
Ben Am predicted it would be trivial for Handala and its MOIS operators to restore their content on another domain very quickly—a forecast that proved accurate within a single day. This highlights the persistent and adaptive nature of state-sponsored hacking groups, which often have the resources and infrastructure to rebound swiftly from disruptions.
Broader Context and Implications
The Handala Hack Team's activities are part of a larger pattern of cyber operations linked to Iran, which have targeted various sectors, including healthcare and technology. The group's ability to quickly recover from domain seizures raises concerns about the effectiveness of such countermeasures in curbing state-sponsored cyber threats. It also emphasizes the need for continuous and multifaceted cybersecurity strategies to combat these evolving risks.
As geopolitical tensions, such as those involving the US, Israel, and Iran, continue to escalate, cyberattacks are increasingly used as tools of influence and disruption. The Handala case serves as a reminder of the ongoing challenges in securing digital infrastructures against sophisticated adversaries.



