U.S. Seizes Iranian Domains Used in Cyber Ops
- The U.S. Justice Department has seized four domains linked to Iranian state‑backed cyber operations.
- Investigators say the sites supported hacking campaigns, data leaks, and intimidation efforts targeting dissidents and foreign nationals.
- Authorities describe the action as part of a broader effort to disrupt Iran’s online influence and repression activities.
Disruption of a Coordinated Cyber Network
The U.S. Justice Department has seized four internet domains allegedly operated by Iran’s Ministry of Intelligence and Security (MOIS), following an FBI investigation into state‑backed cyber and intimidation campaigns. According to officials, the domains—Justicehomeland.org, Handala-Hack.to, Karmabelow80.org, and Handala-Redwanted.to—were used to support hacking operations, leak stolen data, and threaten dissidents, journalists, and individuals connected to Israel. Authorities describe the seizures as part of a broader effort to disrupt Iran’s online influence activities and limit the reach of cyber-enabled repression targeting both U.S.-based and international victims.
Investigators report that the Handala-hack[.]to domain was used to claim responsibility for a destructive malware attack in March 2026 against a U.S. medical technology company. The attackers framed the incident as retaliation for alleged cyber actions against Iran and its regional allies. The same domain, along with Handala-redwanted[.]to, published sensitive personal information belonging to individuals associated with the Israeli Defense Forces and other Israeli institutions. These postings included explicit threats, suggesting that the victims’ locations were known and that further consequences were imminent.
Threat Activity Linked to Handala-Hack and Handala-Redwanted
The FBI found that the operation extended beyond public leaks. An email account linked to the Handala persona sent death threats to Iranian dissidents and journalists living in the United States and abroad. Messages referenced cooperation with criminal organizations and offered financial rewards for acts of violence. Investigators say these communications were part of a coordinated intimidation strategy aimed at silencing critics of the Iranian government and creating fear within diaspora communities.
Court documents indicate that the seized domains were interconnected through shared infrastructure, including overlapping IP ranges and similar operational methods. This operational “playbook” combined disruptive cyberattacks with psychological operations designed to intimidate targeted groups. One posting claimed the theft of 851 gigabytes of data from members of the Sanzer Hasidic Jewish community, accompanied by threatening language intended to amplify the attackers’ perceived reach.
Additional Domains and International Implications
Two of the domains—Justicehomeland[.]org and Karmabelow80[.]org—were linked to a separate MOIS-controlled entity posing as a hacktivist group. These sites were used to claim responsibility for cyber intrusions targeting Albanian government organizations in 2022, apparently in retaliation for Albania’s support of the Iranian dissident group MEK. Officials note that these incidents contributed to diplomatic tensions between the two countries.
The Justice Department emphasizes that the domain seizures are part of a wider effort to counter foreign cyber operations targeting U.S. infrastructure and communities. The State Department’s Rewards for Justice program is offering up to $10 million for information on individuals conducting malicious cyber activity on behalf of foreign governments. The FBI Baltimore Field Office continues to lead the investigation, with prosecutors from Maryland and the Justice Department’s National Security Cyber Section overseeing the case. Authorities caution that while the seized domains are offline, similar state-backed cyber activities may persist through other channels, underscoring the need for ongoing monitoring and interagency cooperation.
How Prepared Is the United States for State‑Backed Cyberattacks? A Deep Analysis of the Iran Domain Seizure Case
|
