Iranian-Aligned Groups Launch 'The Great Epic' Wiper Campaign Targeting Israel and Allies

Iranian Threat Groups Launch 'Great Epic' Wiper Campaign, Prompting Israeli Alert

HIGH
March 6, 2026
March 9, 2026
4m read
CyberattackThreat ActorMalware

Related Entities(initial)

Threat Actors

Handala Hack

Organizations

Iran's Ministry of Intelligence and Security (MOIS)Israel's National Cyber DirectorateIsraeli Defense Force (IDF)

Other

Sanzer Hasidic Jewish community

Full Report(when first published)

Executive Summary

Following recent military actions, a coalition of Iranian-aligned threat actors has initiated a widespread, retaliatory cyber offensive named "The Great Epic." This campaign is characterized by the deployment of destructive wiper malware intended to cause maximum disruption rather than financial gain. Targets have included critical infrastructure in Israel, fuel suppliers in Jordan, and logistics providers supporting military operations. The hacktivist group Handala Hack, believed to be a front for Iran's Ministry of Intelligence and Security (MOIS), has claimed responsibility for several attacks. On March 6, 2026, Israel's National Cyber Directorate issued a critical alert, warning that attackers were actively breaching corporate networks to delete servers and workstations, underscoring the destructive intent of the campaign.

Threat Overview

The "Great Epic" campaign represents a significant escalation in geopolitical cyber conflict, moving from espionage to overt, destructive attacks. The primary threat actor identified is Handala Hack, a group using hacktivist branding to conduct operations aligned with Iranian state interests. The campaign's tactics are twofold:

  1. Destructive Attacks: The core of the operation involves deploying wiper malware to render systems inoperable by destroying data on servers and workstations.
  2. Psychological Operations: Alongside the wiper attacks, the group is conducting data leak operations. They have claimed to have stolen and published confidential data of Israeli Defense Force (IDF) personnel and 851 GB of data from the Sanzer Hasidic Jewish community, accompanied by direct threats.

Technical Analysis

While specific malware samples have not been detailed in public reports, the attack lifecycle is consistent with state-sponsored disruptive campaigns. Key TTPs include:

  • Initial Access: Likely achieved through a combination of spear-phishing campaigns, exploitation of unpatched public-facing applications (T1190 - Exploit Public-Facing Application), and use of stolen credentials.
  • Execution and Persistence: Once inside, actors would establish persistence and move laterally to identify critical systems like domain controllers and file servers.
  • Data Exfiltration: Before destruction, sensitive data is exfiltrated to be used for psychological operations and public leaks (T1041 - Exfiltration Over C2 Channel).
  • Impact: The final stage involves the execution of the wiper payload (T1485 - Data Destruction), which overwrites or deletes data on targeted systems, causing widespread operational disruption.

Impact Assessment

The impact of "The Great Epic" campaign is severe and multi-faceted:

  • Operational Disruption: The primary goal is to disrupt critical services, including energy, logistics, and government functions. This can have cascading effects on the civilian population and military readiness.
  • Data Destruction: Unlike ransomware, there is no option for recovery. The data is permanently lost, requiring organizations to rely entirely on backups for restoration.
  • Psychological Impact: The leaking of sensitive personal data of military personnel and threats against specific communities are designed to incite fear, sow discord, and undermine public confidence.
  • Geopolitical Escalation: These overt cyberattacks contribute to the escalating cycle of conflict in the region, with a high risk of spillover affecting organizations in allied nations.

Detection & Response

Detection:

  • Monitor for large-scale file modification or deletion activity on endpoints and file shares. EDR and FIM tools are critical for this.
  • Look for the use of legitimate tools like PsExec or WMIC for lateral movement and mass payload deployment.
  • Analyze network traffic for large, anomalous data transfers to unknown external destinations, which could indicate pre-attack data exfiltration.

Response:

Due to the destructive nature of wipers, speed is critical. Upon detection of suspicious activity, immediately implement network segmentation to isolate the affected subnets and prevent the malware from spreading. Powering off critical systems may be necessary to preserve data before it is wiped. Activate your incident response plan and engage with national cybersecurity authorities.

Mitigation

The most critical defense against wiper malware is a robust and resilient backup strategy.

  1. Immutable Backups: Maintain multiple, offline, and immutable backups of all critical systems and data. Ensure that at least one copy is physically or logically air-gapped from the primary network.
  2. Network Segmentation: Implement a strict network segmentation model to contain the spread of a wiper attack. Prevent lateral movement between different security zones.
  3. Privileged Access Management (PAM): Strictly control and monitor the use of administrative accounts. An attacker gaining privileged access is a key enabler for a successful wiper attack.
  4. Endpoint Detection and Response (EDR): Deploy an EDR solution capable of detecting and blocking behaviors associated with wipers, such as rapid file encryption or deletion (M1049 - Antivirus/Antimalware).

Timeline of Events

1
March 6, 2026
Israel's National Cyber Directorate issued a warning about active wiper attacks.
2
March 6, 2026
Handala Hack was actively posting claims and leaked data on its domains.
3
March 6, 2026
This article was published

Article Updates

March 9, 2026

Medical tech giant Stryker confirmed a global disruption from a Handala wiper attack, leading to sensitive patient data theft and significant operational impact.

MITRE ATT&CK Mitigations

This is the most critical mitigation against destructive wiper attacks, enabling recovery of lost data.

Isolating network segments can contain a wiper outbreak and prevent it from spreading across the entire organization.

Strictly controlling and monitoring privileged accounts makes it harder for attackers to gain the access needed to deploy wipers at scale.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

IranHandala HackWiper MalwareThe Great EpicGeopolitical ConflictIsraelData Destruction

📢 Share This Article

Help others stay informed about cybersecurity threats