Void Manticore / Handala
Repository Navigation
- Actor workbench: Void Manticore / Handala
- TTP-to-detection matrix: all mapped techniques
- Surface and capability routes: Identity, MDM, And Cloud Administration; Destructive Operations, Backup Deletion, And Wipers
- Detection status: dashboard
- Hunt workflow: hunt workflow
- ATT&CK mappings: T1566 Phishing (M2); T1204 User Execution (M2); T1485 Data Destruction (M2); T1490 Inhibit System Recovery (M2); T1567 Exfiltration Over Web Service (M2); T1078.004 Valid Accounts: Cloud Accounts (M3)
- Mapped detections: DET-001 Intune Bulk Device Wipe Anomaly (Hunt, DRL-5); DET-004 Mail Click To Execution Correlation (Hunt, DRL-4)
- Mapped hunts: HUNT-001 If identity-plane destructive tradecraft is attempted then privileged role activation or bulk device actions will appear in audit logs; HUNT-004 If VIP phishing is active then mail click events will correlate to risky sign-in or execution
- IOC reference sources:
SRC-AP-HANDALAIP/CIDR; hashes; URLs; actor channels; soft IOCs;SRC-THREAT-HUNTER-V3Domains; IPs; file names; driver names; behavioral IOCs - Tool detail pages:
BiBi / BiBi Wiper lineage;Handala-linked destructive installer chains;CHIMNEYSWEEP;ftp;Impacket;Mimikatz;RawDisk;ROADSWEEP;ZeroCleare - Tool matrix: all actor-linked tools (9 mapped tool row(s))
- Evidence records:
EVD-005/CLM-HANDALA-001;EVD-006/CLM-HANDALA-002 - Imported research intakes: None currently mapped.
- Intel update candidates: 1 current candidate(s)
- Source IDs in structured data:
SRC-AP-HANDALA,SRC-MITRE-G1055,SRC-PUSH-STRYKER-HANDALA,SRC-THREAT-HUNTER-V3
Primary cluster: Void Manticore.
Public personas and aliases: Handala Hack, Karma, Karma Below (Karmabelow80), Homeland Justice, Storm-0842, BANISHED KITTEN, Dune, COBALT MYSTIQUE, Red Sandstorm.
Note on naming: Handala, Karma, and Homeland Justice are treated here as public personas associated with Void Manticore, not interchangeable proof that every public claim is a confirmed Void Manticore intrusion. "Storm-842" appears in some secondary literature as a shorthand for Storm-0842; both refer to the same Microsoft-designated cluster. "Temple of Oats" is the title of the Mandiant/Check Point reporting on Void Manticore, not a tracked alias. Homeland Justice was used in Albania-targeting campaigns.
Assessed sponsor: Iran-aligned persona / MOIS-linked cluster in public reporting. Incident-level confidence varies by source and event.
Relevance
Void Manticore / Handala is high priority for Israeli government and public-sector defenders because the related cluster and persona reporting focus heavily on Israeli organizations, civilian-impact sectors, public claims, leak pressure, and destructive or disruptive operations.
Andrey Pautov's Medium assessment SRC-AP-HANDALA frames Handala as an influence-enabled intrusion threat: compromise, leak or destructive action, rapid public claim publication, and narrative amplification. The profile also notes cross-vendor cluster convergence around Void Manticore / Storm-0842 / BANISHED KITTEN / Dune style naming, while warning that vendor naming overlap does not prove every incident-level attribution.
Defensive Focus
- Public claim monitoring.
- Evidence preservation.
- Defacement and public web integrity monitoring.
- Communications playbooks for unverified claims.
- Wiper and destructive-activity first-response playbooks.
- Installer/archive execution chains from user-controlled locations.
- Commercial file-sharing and cloud-hosted payload delivery.
- Backup integrity, recovery controls, and privileged-account containment.
Analytic Caution
Use low-to-medium confidence unless a primary technical source ties the persona to a confirmed incident.
Detection Ideas
- Archive or installer execution after current-event lure delivery.
.msi,.exe, or script execution fromDownloads,%TEMP%, or mail attachment extraction paths.- Commercial file-sharing download followed by child process creation.
- Backup deletion, recovery inhibition, or endpoint protection tampering near suspected compromise windows.
- Public claim timeline correlated with SIEM, EDR, WAF, identity, and email telemetry before external communications.
Repository Sources
SRC-MITRE-G1055: MITRE VOID MANTICORE profile — primary alias registry (Handala Hack, Homeland Justice, Karma, Karmabelow80, BANISHED KITTEN, Red Sandstorm, COBALT MYSTIQUE, Dune).SRC-CP-HANDALA-2026: Check Point Research Handala modus operandi report (March 2026).SRC-CP-VOID-2024: Check Point Research "Bad Karma No Justice" — Void Manticore destructive activity in Israel, Karma persona (May 2024).SRC-CP-MOIS-CRIME: Check Point Research analysis of MOIS-linked actors and criminal ecosystem convergence (March 2026).SRC-PUSH-STRYKER-HANDALA: Push Security Stryker incident analysis — Intune Remote Wipe via compromised Global Administrator credentials (March 2026).SRC-AP-HANDALA: authored CTI assessment with SOC defensive guidance — rated B, trace primary references for operational decisions.