The data, shared through its dark web channels and online platforms, was accompanied by misleading claims labeling legitimate workers as criminals.
The group’s post featured full names, photos, workplaces, and professional roles of dozens of individuals, along with aggressive statements urging followers to submit additional personal information for monetary rewards.
The activity represents a dangerous evolution from information operations to direct targeting of private-sector employees.
Initial analysis shows that most of the data was likely scraped from LinkedIn and other open sources. Many entries display inconsistencies; some individuals reportedly left their companies years ago, while others do not hold senior or strategic positions.
A few profiles appear fabricated or unverifiable, suggesting that the dataset mixes real and falsified information.
Investigators tracking the group’s activity note that such campaigns aim to create fear and paranoia. By misusing personal and professional details, Handala attempts to stir public sentiment and expose ordinary professionals to digital harassment or real-world threats.
Handala, active in cyber operations tied to Middle Eastern geopolitical tensions, has previously focused on symbolic defacements and data leaks of organizations associated with Israel.
However, this new phase marks a shift toward personalized targeting and doxxing. Rather than aiming solely at institutions, the group now targets individual employees, portraying them as participants in alleged military or political activities.
Experts consider this tactic a blend of psychological warfare and intelligence gathering. Even though most of the data appears to come from publicly available profiles, its framing and dissemination serve as tools of intimidation.
The inclusion of a financial bounty for further information on individuals amplifies the risk, potentially motivating malicious actors to harvest, sell, or exploit stolen data.
This incident demonstrates how professional networking platforms, when scraped at scale, can become sources of intelligence for threat actors.
The overlap between open-source intelligence (OSINT) and disinformation makes verification difficult and increases the spread of false narratives.
Security analysts warn that these actions may encourage similar campaigns in other regions, turning harmless public data into a weapon for defamation or social engineering.
For targeted individuals, experts recommend immediate steps such as tightening privacy settings, monitoring online mentions, and reporting potential misuse of personal details.
Organizations are urged to educate employees on digital footprint management to reduce exposure to such politically motivated attacks.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Handala Group Intensifies Attacks on Israeli High-Tech and Aerospace Personnel appeared first on Cyber Security News.
Warhammer 40,000: Space Marine 2 publisher Focus Entertainment and developer Saber Interactive have issued an…
Bungie has been teasing the fourth map in its recently released extraction shooter, Marathon –…
Nvidia revealed DLSS 5 earlier this week, working neural rendering into its AI technology suite…
Spider-Man and Civil War star Kirsten Dunst is reportedly joining A Minecraft Movie 2 to…
The Secretlab Spring Sale has officially commenced and with it are a couple of different…
Since it debuted in 2016, if you wanted to watch the mega-blockbuster show Stranger Things,…
This website uses cookies.