FBI Seizes Handala Websites After Destructive Stryker Cyberattack
Image: TechCrunch

FBI Seizes Handala Websites After Destructive Stryker Cyberattack

19 March, 2026.Technology and Science.4 sources

Key Takeaways

  • FBI seized two Handala domains following the destructive Stryker cyberattack.
  • Domains display seizure notices under a federal seizure warrant.
  • U.S. authorities say the domains facilitated malicious activity in coordination with a foreign state actor.

FBI Seizure Action

The seizure follows the group's destructive cyberattack on medical technology giant Stryker that wiped approximately 80,000 devices.

Image from Bleeping Computer
Bleeping ComputerBleeping Computer

The seized domains, handala-redwanted[.]to and handala-hack[.]to, now display official seizure notices issued by the FBI.

These notices were issued under a warrant from the District Court for the District of Maryland.

The seizure messages state the domains were used for malicious cyber activities on behalf of or in coordination with a foreign state actor.

These activities include unauthorized network intrusions, infrastructure targeting, or violations of U.S. law.

The FBI action represents a significant disruption of the group's online infrastructure and propaganda operations.

Handala Group Profile

Handala, also known as Handala Hack Team, Hatef, or Hamsa, is an Iranian-linked, pro-Palestinian hacktivist collective.

The group first emerged in December 2023.

Image from FindArticles
FindArticlesFindArticles

It has been widely assessed by private-sector analysts to have ties to the Iranian ecosystem of state-backed operators.

The group reportedly has links to Iran's Ministry of Intelligence and Security (MOIS).

Following the FBI seizure, Handala acknowledged the takedown on its Telegram channel, framing it as censorship.

Their social media account on X was also suspended.

The group maintains two distinct types of online infrastructure.

One domain serves as a propaganda hub cataloging their intrusions.

The other publishes personal data of individuals connected to Israeli defense companies and military operations.

Stryker Attack Details

It targeted a Fortune 500 medical technology company with more than 56,000 employees across dozens of countries.

According to Handala claims and industry sources, attackers obtained a privileged internal account.

They created a new Global Administrator account to use in their attack.

The breach was particularly destructive in nature.

Attackers moved laterally across Stryker's Windows environment.

They accessed the company's Microsoft Intune management console.

From this privileged position, they issued wipe commands to laptops and mobile devices.

Stryker disclosed it is still restoring computers and internal networks following the breach.

This indicates the severity of the attack.

Attack Technical Significance

The technical nature of the Stryker attack represents a significant evolution in destructive cyber operations.

This is particularly due to the method of abusing mobile device management platforms.

Image from TechCrunch
TechCrunchTechCrunch

Such approaches are rare because they require highly privileged access.

When successful, the impact can mirror dedicated wiper malware.

Security analysts have drawn parallels to the 2012 Iran-linked Shamoon attack.

That attack erased data on roughly 30,000 Saudi Aramco systems.

The Shamoon attack serves as a benchmark for destructive operations affecting physical industries.

The FBI seizure notice characterized Handala's activities as more than ordinary hacktivism.

The notice explicitly stated U.S. authorities view the operation as involving coordination with a foreign state actor.

This assessment suggests deeper connections between the group and state-sponsored cyber operations.

Broader Cyber Context

These operations blend hack-and-leak tactics with data destruction during geopolitical tensions.

Image from Bleeping Computer
Bleeping ComputerBleeping Computer

Security firms like Mandiant and Microsoft have documented multiple Iran-aligned campaigns following this pattern.

This suggests a deliberate strategy of escalating cyber capabilities during heightened international conflict.

The targeting of Stryker, a major healthcare supplier rather than a hospital, indicates broader objectives.

These objectives extend beyond healthcare infrastructure to the medical technology ecosystem.

The seizure action represents a significant law enforcement response to state-aligned hacktivism.

The FBI took control of domains to disrupt ongoing malicious cyber operations.

They aim to prevent further exploitation by the group.

As investigations continue, details remain limited about the scope of the FBI's access.

It's unclear if they only seized domains or gained access to content and server logs.

More on Technology and Science