ANAVEM
Languagefr
FBI Warns of Iranian Hackers Using Telegram as Malware Command Infrastructure

FBI Warns of Iranian Hackers Using Telegram as Malware Command Infrastructure

The FBI has issued a warning about Iranian hackers linked to the Ministry of Intelligence and Security using Telegram as command-and-control infrastructure to deploy malware targeting journalists, dissidents, and opposition groups worldwide.

23 March 2026, 00:00 5 min read

Last updated 23 March 2026, 12:00

SEVERITYHigh
EXPLOITUnknown
PATCH STATUSUnavailable
VENDORIran MOIS / Handala / Homeland Justice
AFFECTEDSystèmes Windows, plateforme T...
CATEGORYCybersecurity

Key Takeaways

Iranian Hackers Weaponize Telegram for Cyber Espionage

United States federal investigators have issued a formal alert notifying network defenders about a coordinated cyber campaign in which Iranian state-affiliated hackers are exploiting the Telegram messaging platform to command malware deployed against perceived adversaries of the Iranian government.

The hackers, operating under the banner of the Handala hacktivist group — also referred to as Handala Hack Team, Hatef, and Hamsa — along with the state-sponsored Homeland Justice threat group linked to Iran's Islamic Revolutionary Guard Corps (IRGC), are utilizing Telegram as command-and-control (C2) infrastructure to manage Windows-based malware on compromised systems.

Targets and Tactics

The campaign specifically targets journalists who have been critical of the Iranian government, Iranian dissidents living abroad, and a range of opposition organizations active globally. Once the malware is successfully installed on a victim's device, the attackers are able to capture screenshots and exfiltrate sensitive files from the compromised machine.

Social engineering techniques are being employed to trick targets into installing the malicious software. The attackers have refined their approach to appear credible, often posing as trusted contacts or organizations to gain victims' confidence before delivering the malicious payloads.

Related: How to Set Up Secure Intune Conditional Access Policies

Related: Block USB Drives Using Microsoft Intune Attack Surface

Related: Implement EDR Hardening Against Malware Killers in 2026

Related: Poland Nuclear Research Center Hit by Cyberattack

Related: Iranian Handala Hackers Breach Stryker with Stolen

Associated Threat Groups and Domain Seizures

In a coordinated action, law enforcement authorities seized four internet domains previously operated by the Handala and Homeland Justice groups, as well as a third threat actor known as Karma Below. These domains were used as platforms to publish data and documents stolen during cyberattacks against victims across the United States and internationally.

The same threat actors were also connected to a destructive cyberattack against a major US medical technology corporation, in which they leveraged access to a Windows domain administrator account and executed a mass device wipe affecting approximately 80,000 endpoints, including employee computers and mobile devices managed by the company.

Broader Iranian Cyber Threat Landscape

Authorities linked both the Handala and Homeland Justice groups to Iran's Ministry of Intelligence and Security (MOIS), identifying this campaign as part of a broader pattern of Iranian cyber operations designed to silence dissent, collect intelligence, and inflict reputational damage on targeted individuals and organizations.

The alert describes the dual intent of these operations: gathering actionable intelligence while simultaneously weaponizing stolen data to damage the credibility and reputation of victims. Authorities have emphasized that the elevated geopolitical tensions in the Middle East have directly contributed to an increase in this type of malicious activity.

Mitigation Recommendations

In addition to raising awareness, federal authorities have released a set of recommended mitigation strategies to help organizations and individuals reduce their exposure to these threats. These include enhanced monitoring of network traffic for unusual Telegram-related communications, robust endpoint detection and response capabilities, and user awareness training focused on social engineering tactics commonly used in targeted phishing and malware delivery campaigns.

Frequently Asked Questions

What is the Handala hacker group?+
Handala, also known as Handala Hack Team, Hatef, or Hamsa, is an Iranian-linked hacktivist group affiliated with Iran's Ministry of Intelligence and Security (MOIS) that conducts cyberattacks targeting journalists, dissidents, and opposition groups.
How are Iranian hackers using Telegram?+
Iranian hackers are using Telegram as a command-and-control (C2) infrastructure to remotely manage Windows malware deployed on victims' devices, enabling them to issue commands and receive exfiltrated data such as screenshots and files.
Who are the main targets of these cyberattacks?+
The primary targets include journalists critical of the Iranian government, Iranian dissidents living abroad, and various opposition groups and organizations worldwide.
What actions has the FBI taken against these threat groups?+
The FBI seized four internet domains used by the Handala and Homeland Justice threat groups and issued a formal flash alert to warn network defenders and provide mitigation strategies.

Discussion

Share your thoughts and insights

Sign in to join the discussion