Following recent military actions, a coalition of Iranian-aligned threat actors has initiated a widespread, retaliatory cyber offensive named "The Great Epic." This campaign is characterized by the deployment of destructive wiper malware intended to cause maximum disruption rather than financial gain. Targets have included critical infrastructure in Israel, fuel suppliers in Jordan, and logistics providers supporting military operations. The hacktivist group Handala Hack, believed to be a front for Iran's Ministry of Intelligence and Security (MOIS), has claimed responsibility for several attacks. On March 6, 2026, Israel's National Cyber Directorate issued a critical alert, warning that attackers were actively breaching corporate networks to delete servers and workstations, underscoring the destructive intent of the campaign.
The "Great Epic" campaign represents a significant escalation in geopolitical cyber conflict, moving from espionage to overt, destructive attacks. The primary threat actor identified is Handala Hack, a group using hacktivist branding to conduct operations aligned with Iranian state interests. The campaign's tactics are twofold:
While specific malware samples have not been detailed in public reports, the attack lifecycle is consistent with state-sponsored disruptive campaigns. Key TTPs include:
T1190 - Exploit Public-Facing Application), and use of stolen credentials.T1041 - Exfiltration Over C2 Channel).T1485 - Data Destruction), which overwrites or deletes data on targeted systems, causing widespread operational disruption.The impact of "The Great Epic" campaign is severe and multi-faceted:
Detection:
PsExec or WMIC for lateral movement and mass payload deployment.Response:
Due to the destructive nature of wipers, speed is critical. Upon detection of suspicious activity, immediately implement network segmentation to isolate the affected subnets and prevent the malware from spreading. Powering off critical systems may be necessary to preserve data before it is wiped. Activate your incident response plan and engage with national cybersecurity authorities.
The most critical defense against wiper malware is a robust and resilient backup strategy.
M1049 - Antivirus/Antimalware).Medical tech giant Stryker confirmed a global disruption from a Handala wiper attack, leading to sensitive patient data theft and significant operational impact.
This is the most critical mitigation against destructive wiper attacks, enabling recovery of lost data.
Isolating network segments can contain a wiper outbreak and prevent it from spreading across the entire organization.
Strictly controlling and monitoring privileged accounts makes it harder for attackers to gain the access needed to deploy wipers at scale.
Israel's National Cyber Directorate issued a warning about active wiper attacks.
Handala Hack was actively posting claims and leaked data on its domains.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.