Increased Risk of Wiper Attacks Amid Conflict with Iran
Recent intelligence from Unit 42 highlights a heightened threat of wiper attacks, particularly targeting organizations in Israel and the United States, associated with the Handala Hack group. Initially appearing as hacktivists, this group is now believed to operate under the direction of Iran’s Ministry of Intelligence and Security, engaging in destructive tactics that exploit identity vulnerabilities and administrative access.
Handala Hack has recently employed phishing techniques to gain initial access, leveraging Microsoft Intune to execute wiper operations aimed at disrupting organizational functions. This escalation of cyber activity has prompted warnings from Israel’s National Cyber Directorate regarding incidents of access to corporate networks resulting in the deletion of critical data and servers. The attackers often use credentials from legitimate corporate users to bypass security measures.
Defensive Context
Organizations should be keenly aware of the tactics employed by Handala, particularly around the exploitation of identity management systems and the use of phishing to gain unauthorized access. Entities with significant reliance on Microsoft Intune for device management need to prioritize understanding the risks and implementing measures to mitigate them.
Why This Matters
The risk associated with these wiper attacks is significant for organizations, especially those with ties to or operations in regions affected by the conflict with Iran. Organizations that have high-value or sensitive data could be particularly vulnerable, making them potential targets for these disruptive operations.
Defender Considerations
The recommendations from Unit 42 emphasize proactive measures, such as the implementation of Just-in-Time access for administrative roles to reduce risks from standing privileges. Organizations are encouraged to limit the number of Global and Intune Administrator accounts and employ multi-factor authentication to safeguard high-level access. Monitoring audit logs for destructive actions like RemoteWipe and FactoryReset can also aid in rapid detection and response to malicious activities.
Indicators of Compromise (IOCs)
While specific IOCs were not detailed in the report, entities should remain vigilant and review their access logs and user behavior for signs of anomalous access or abrupt deletions that could signal ongoing wiper attack attempts.



