Following recent military actions, a coalition of Iranian-aligned threat actors has initiated a widespread, retaliatory cyber offensive named "The Great Epic." This campaign is characterized by the deployment of destructive wiper malware intended to cause maximum disruption rather than financial gain. Targets have included critical infrastructure in Israel, fuel suppliers in Jordan, and logistics providers supporting military operations. The hacktivist group Handala Hack, believed to be a front for Iran's Ministry of Intelligence and Security (MOIS), has claimed responsibility for several attacks. On March 6, 2026, Israel's National Cyber Directorate issued a critical alert, warning that attackers were actively breaching corporate networks to delete servers and workstations, underscoring the destructive intent of the campaign.
The "Great Epic" campaign represents a significant escalation in geopolitical cyber conflict, moving from espionage to overt, destructive attacks. The primary threat actor identified is Handala Hack, a group using hacktivist branding to conduct operations aligned with Iranian state interests. The campaign's tactics are twofold:
While specific malware samples have not been detailed in public reports, the attack lifecycle is consistent with state-sponsored disruptive campaigns. Key TTPs include:
T1190 - Exploit Public-Facing Application), and use of stolen credentials.T1041 - Exfiltration Over C2 Channel).T1485 - Data Destruction), which overwrites or deletes data on targeted systems, causing widespread operational disruption.The impact of "The Great Epic" campaign is severe and multi-faceted:
Detection:
PsExec or WMIC for lateral movement and mass payload deployment.Response:
Due to the destructive nature of wipers, speed is critical. Upon detection of suspicious activity, immediately implement network segmentation to isolate the affected subnets and prevent the malware from spreading. Powering off critical systems may be necessary to preserve data before it is wiped. Activate your incident response plan and engage with national cybersecurity authorities.
The most critical defense against wiper malware is a robust and resilient backup strategy.
M1049 - Antivirus/Antimalware).Medical tech giant Stryker confirmed a global disruption from a Handala wiper attack, leading to sensitive patient data theft and significant operational impact.
This is the most critical mitigation against destructive wiper attacks, enabling recovery of lost data.
Isolating network segments can contain a wiper outbreak and prevent it from spreading across the entire organization.
Strictly controlling and monitoring privileged accounts makes it harder for attackers to gain the access needed to deploy wipers at scale.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats