Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Choices and Useful Scope

    January 25, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Handala Hackers Breach Telegram Accounts Linked to Israeli Officers
    AI Ethics & Regulation

    Handala Hackers Breach Telegram Accounts Linked to Israeli Officers

    Declan MurphyBy Declan MurphyJanuary 2, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Handala Hackers Breach Telegram Accounts Linked to Israeli Officers
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    In December 2025, the Iran-linked hacking group often called Handala escalated its affect operations towards Israel’s political institution by publishing materials it claimed was pulled from the totally “compromised” cellular units of two high-profile officers.

    A technical assessment by risk intelligence agency KELA, nonetheless, signifies the intrusions have been far narrower in scope centered on unauthorized entry to Telegram accounts somewhat than complete machine takeover.

    The primary alleged breach, branded by Handala as “Operation Octopus,” focused former Israeli Prime Minister Naftali Bennett.

    The group claimed it had hacked Bennett’s iPhone 13 and launched contact lists, pictures, movies, and roughly 1,900 chat conversations.

    The leak appeared designed to maximise political and psychological impression: uncovered contacts reportedly included senior Israeli officers, journalists, and enterprise executives.

    Bennett initially denied that his machine had been compromised, however later acknowledged unauthorized entry to his Telegram account whereas sustaining that his telephone itself remained safe.

    Quickly afterward, Handala claimed it had additionally breached the iPhone belonging to Tzachi Braverman, Chief of Employees to Prime Minister Benjamin Netanyahu.

    In statements accompanying the leak, the group alleged it possessed encrypted communications, monetary data, and proof tied to corruption threatening extra disclosures framed round alleged political scandals.

    In accordance with KELA’s information lake, Handala posted roughly 140 posts throughout platforms together with BreachForums, Ramp, and Exploit throughout this era.

    Handala submit on cybercrime platform BreachForums.

    The info Handala printed included contact lists for senior officers, movies from public occasions, and unclassified paperwork. Israel’s Prime Minister’s Workplace publicly denied the breach.

    Handala Telegram Hack

    KELA’s evaluation of the launched dataset challenges the group’s headline claims. Investigators discovered that the supposed “chat conversations” have been largely composed of empty contact playing cards robotically generated by Telegram when an account synchronizes contacts.

    Out of the roughly 1,900 purported chats, solely round 40 contained precise messages, and fewer nonetheless confirmed significant exchanges.

    The group’s websites ran on WordPress and, at occasions, left administrative login pages uncovered, revealing a major consumer account, “vie6c”, liable for working the positioning. 

    Handala seeking assistance through the aaPanel platform.
    Handala looking for help by means of the aaPanel platform.

    Critically, the contacts within the dump have been linked to lively Telegram accounts, supporting KELA’s evaluation that the supply of the information was Telegram account entry somewhat than deep forensic extraction from the underlying units.

    The episode reinforces a key actuality of recent political concentrating on: messaging accounts may be hijacked by means of a number of pathways that don’t require “hacking the telephone.”

    Frequent vectors embody SIM swapping and SMS interception, multi-step social engineering to seize one-time passcodes (together with voicemail-based OTP restoration), and phishing by way of faux Telegram login pages or malicious QR code flows that may immediately authorize a brand new session.

    Implications

    Telegram’s non-obligatory “cloud password” (its extra password layer) additionally stays a weak level when not enabled or when attackers can steal it by way of phishing, keylogging, or password reuse.

    KELA additional assessed that session hijacking stays a sensible route for succesful actors. Telegram Desktop session materials saved within the “tdata” folder can grant full account entry if copied from a compromised workstation or from cloud-synced backups.

    Whereas Handala has traditionally deployed infostealers and harmful malware by means of phishing campaigns impersonating trusted distributors, the most recent leaks recommend account-level compromise might ship ample impression with no full-device intrusion.

    Handala first emerged publicly in late 2023 and has maintained a persistent presence throughout cybercrime boards and social platforms, repeatedly resurfacing after account takedowns.

    Open-source reporting and OSINT analysis have linked the group to Iran’s broader cyber ecosystem, the place affiliated “leak manufacturers” are used to amplify coercion and narrative warfare even when technical entry is proscribed.

    For officers and organizations, the incident is a reminder that “safe” apps are solely as sturdy as their session controls.

    Enabling Telegram’s cloud password, tightening SIM safety with carriers, auditing lively classes, and isolating messaging from cloud backups can cut back the chance of account compromise particularly for high-value targets dealing with sustained spear-phishing and affect operations.

    Comply with us on Google Information, LinkedIn, and X to Get Immediate Updates and Set GBH as a Most well-liked Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026

    Multi-Stage Phishing Marketing campaign Targets Russia with Amnesia RAT and Ransomware

    January 25, 2026
    Top Posts

    Pricing Choices and Useful Scope

    January 25, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Pricing Choices and Useful Scope

    By Amelia Harper JonesJanuary 25, 2026

    SweetAI is offered as a chatbot designed for customers in search of interplay that doesn’t…

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.