FBI seizes Handala data leak site after Stryker cyberattack
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是FBI查封了Handala黑客组织的两个网站。Handala最近对医疗科技巨头Stryker进行了网络攻击,导致约8万台设备被擦除。这两个网站现在显示被查封的公告,说明是根据马里兰州地方法院的命令查封的。同时,文章提到Handala与伊朗有关联,主要攻击以色列组织,并且这次攻击使用了恶意软件。 用户要求总结控制在100字以内,不需要特定开头。我需要提炼关键点:FBI查封网站、Handala组织、攻击Stryker、设备被擦除、与伊朗关联、目标以色列组织。 接下来,我要把这些信息用简洁的语言表达出来,确保不超过字数限制。同时,要确保语句通顺,信息准确。 </think> FBI查封了伊朗关联的黑客组织Handala的两个网站,该组织因对医疗科技公司Stryker发动网络攻击导致约8万台设备被擦除而受到打击。 2026-3-19 16:17:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

FBI

The FBI has seized two websites used by the Handala hacktivist group after the threat actors conducted a destructive cyberattack on medical technology giant Stryker that wiped approximately 80,000 devices.

Both the hacktivist's handala-redwanted[.]to and handala-hack[.]to clearnet domains now display a seizure notice stating that the websites were seized under a seizure warrant issued by the District Court for the District of Maryland.

"This domain has been seized by the Federal Bureau of Investigation ("FBI") pursuant to a seizure warrant issued by a United States District Court for the District of Maryland as apart of a law enforcement action by the FBI. Law enforcement authorities determined this domain was used to conduct, facilitate, or support malicious cyber activities on behalf of, or in coordination with, a foreign state actor," reads the seizure message.

"These activities may include unauthorized network intrusions, infrastructure targeting, or other violations of United States law."

"Pursuant to the court-authorized warrant, the United States Government has taken control of this domain to disrupt ongoing malicious cyber operations and prevent further exploitation."

Seizure banner on Handala clearnet sites
Seizure banner on Handala clearnet sites
Source: BleepingComputer

Handala (also known as Handala Hack Team, Hatef, Hamsa) is an Iranian-linked, pro-Palestinian hacktivist group that first appeared in December 2023, and conducted operations reportedly linked to Iran's Ministry of Intelligence and Security (MOIS). These attacks targeted Israeli organizations with destructive malware designed to wipe Windows and Linux devices.

While there has been no official announcement by law enforcement regarding the seizures, the domain name servers have now been switched to those commonly used by the FBI when seizing domains:

Name Server: ns1.fbi.seized.gov
Name Server: ns2.fbi.seized.gov

It is not known whether the FBI only seized the domains or also has access to the website's content and server logs.

This action follows Handala's massive cyberattack on US medical giant Stryker, in which they compromised a Windows domain administrator account and created a new Global Administrator account to use in their attack.

They then issued the Microsoft Intune "wipe" command to factory reset approximately 80,000 devices, including computers and mobile devices. Employees whose personal devices were managed by the company also found their devices wiped.

Handala has acknowledged the website seizures and need for more "resilient infrastructure," stating that they are in the process of creating new websites to announce their attacks.

"In light of recent events and the need to establish secure and resilient infrastructure, we inform you that building a new digital base is a complex and time-consuming process," reads a Telegram post from the group.

"However, we remain committed to continuing our mission without interruption."

After the attack, Microsoft and CISA released guidance on hardening Windows domains and securing Intune to prevent similar attacks at other companies.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack/
如有侵权请联系:admin#unsafe.sh