15 officers publicly named
On January 3, 2026, the Iran-linked hacktivist group Handala claimed to have exposed the personal details of 15 Israeli Signal Intelligence (SIGINT) officers. This incident is not a result of sophisticated device exploitation but rather a targeted information and psychological warfare operation focused on compromising individual messaging accounts, specifically Telegram. The group, assessed to be a proxy for Iranian intelligence, is leveraging these high-profile leaks to create an atmosphere of vulnerability and distrust within Israel's defense and intelligence apparatus. The campaign relies on social engineering and session hijacking to gain access to accounts, after which they exfiltrate contact lists and fabricate conversations to maximize psychological impact. This tactic has been used previously against former Israeli Prime Minister Naftali Bennett and the Chief of Staff for Prime Minister Benjamin Netanyahu.
The threat actor, Handala, has been active for several years, conducting a series of cyber operations against Israeli targets. This latest incident, dubbed "Handala RedWanted," involves the doxing of 15 individuals purported to be officers in Israeli SIGINT units. The group published a "wanted" list with their names, presenting it as a major intelligence failure for Israel.
However, technical analysis from cybersecurity firm KELA indicates that Handala's claims of deep system compromise are often exaggerated. Their primary modus operandi involves gaining access to cloud-based services like Telegram rather than the physical devices themselves. This is achieved through common attack vectors such as phishing for credentials, tricking users into revealing one-time passwords (OTPs), or exploiting weak session management. The goal is less about gathering sensitive intelligence and more about public humiliation and spreading disinformation. The group's connection to the Iranian threat actor known as Banished Kitten suggests a state-sponsored campaign aimed at undermining Israeli national security through low-cost, high-impact psychological operations.
The attack chain employed by Handala is focused on the user, not the technology. Instead of exploiting zero-day vulnerabilities, they leverage social engineering and credential theft.
This attack highlights a critical distinction: compromising an application is not the same as compromising a device. The lack of evidence of device-level exploits suggests the targets' phones themselves remained secure, but their online accounts were breached.
The primary impact of Handala's campaign is psychological and reputational. For the affected individuals, being publicly identified as intelligence officers poses a significant personal security risk. For the Israeli Army and its intelligence units like Unit 8200, the incident creates a perception of vulnerability, which can erode morale and public trust. While no sensitive operational data appears to have been compromised, the campaign forces the organization to expend resources on damage control, internal investigations, and reinforcing security protocols for personnel's personal communications.
Operationally, the impact is low. However, from a counter-intelligence perspective, it is a significant nuisance that could potentially expose networks of contacts if a compromised account was used for any semi-official communication.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| log_source | Telegram | Monitor Telegram login and session logs for anomalies. | Cloud Service Logs | high |
| network_traffic_pattern | Telegram API | Unusual or high-volume API calls to api.telegram.org from non-standard devices or locations. |
Network Flow Logs | medium |
| user_account_pattern | Doxbin/Pastebin | Proactive searches on paste sites for employee names or email addresses. | OSINT | high |
Detection of such attacks is challenging as it occurs on third-party platforms. Key strategies include:
Settings > Devices).Train users to recognize phishing attempts, especially those targeting credentials for personal communication and social media applications.
Enforce strong, phishing-resistant MFA on all accounts to prevent takeovers even if credentials are stolen.
Mapped D3FEND Techniques:
Use behavioral analytics to detect anomalous logins or session activity that deviates from established user patterns.
Guide users on hardening the security and privacy settings of their personal applications to minimize their attack surface.
Mapped D3FEND Techniques:
Implement and enforce phishing-resistant Multi-Factor Authentication (MFA) for all personnel, especially those in high-risk roles, across all cloud services, including personal messaging apps like Telegram. Prioritize hardware tokens (FIDO2/WebAuthn) or authenticator apps over SMS-based MFA, which is susceptible to SIM-swapping attacks—a common tactic in targeted campaigns. For an organization like the Israeli military, this should be a mandatory policy. This directly mitigates the primary attack vector used by Handala: credential and session theft. Even if an attacker successfully phishes a user's password, they cannot complete the login without the second factor. This transforms the attack from a simple credential compromise into a much more complex real-time session hijacking attempt, significantly raising the bar for the attacker.
While direct monitoring of personal apps like Telegram is not feasible for an organization, high-risk individuals should be educated on how to monitor their own account activity. Furthermore, for any corporate-sanctioned applications, implement User Geolocation Logon Pattern Analysis. This involves establishing a baseline of normal login locations for each user and flagging or blocking logins from anomalous or impossible-to-travel-to locations. For example, if a known Israeli-based officer's account suddenly has a login attempt from Iran, the system should automatically block the attempt and trigger a high-priority alert. This requires a SIEM or identity and access management (IAM) solution capable of ingesting and correlating geolocation data with authentication logs. This technique provides a critical layer of detection for when credential-based defenses fail.
Develop and disseminate clear guidance for hardening the privacy and security settings of commonly used personal applications, with a specific module for Telegram. This guidance should be part of mandatory annual security training for all personnel. Key recommendations for Telegram should include: 1) Setting the 'Phone Number' privacy setting to 'Nobody'. 2) Setting 'Who can find me by my number' to 'My Contacts'. 3) Enabling a 'Passcode Lock' within the app. 4) Regularly reviewing 'Active Sessions' and terminating any unrecognized devices. This proactive hardening reduces the attack surface by making it harder for attackers to discover accounts and by limiting the window of opportunity for compromised sessions. It shifts the defensive posture from purely reactive to preventative, empowering users to protect themselves.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats