BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Roundup: Iran's Handala Wiper Campaign Escalates, China Targets Southeast Asian Military

Nation-State Roundup: Iran's Handala Wiper Campaign Escalates, China Targets Southeast Asian Military

March 13, 2026Nation-State & APT3 min readhigh

Originally reported by Security Affairs, The Record, Palo Alto Unit 42

#nation-state#apt#iran#china#wiper-attacks#espionage#southeast-asia#handala
Share

TL;DR

Unit 42 reports increased wiper attacks by Iran-linked Handala Hack group exploiting Microsoft Intune, while a separate China-based espionage operation targets military infrastructure across Southeast Asia. Additional developments include FBI surveillance data increases, Stryker cyberattack recovery uncertainties, and critical WordPress plugin vulnerabilities.

Why high?

Unit 42 reports active wiper attacks by Iran-linked Handala group and strategic espionage operations by China-based actors targeting military infrastructure in Southeast Asia.

Active Campaigns

Iran's Handala Group Escalates Wiper Operations

Unit 42 researchers observe an increase in destructive wiper attacks by the Iran-linked Handala Hack group (also tracked as Void Manticore). The threat actor leverages phishing campaigns and misuses Microsoft Intune for deployment, representing an evolution in their tactical approach to destructive operations.

The escalation aligns with broader Iranian cyber activities targeting critical infrastructure and suggests potential coordination with geopolitical tensions in the region.

China-Based Espionage Targets Southeast Asian Military

A suspected China-based espionage operation demonstrates strategic operational patience against military targets across Southeast Asia, according to Unit 42 analysis. The campaign deploys custom backdoors and maintains persistent access to high-value military infrastructure.

The operation's focus on Southeast Asian defense capabilities indicates potential intelligence collection priorities aligned with regional territorial disputes and military modernization efforts.

Enterprise Impact

Stryker Faces Extended Recovery Timeline

Medical device manufacturer Stryker disclosed in an SEC 8-K filing that recovery timelines from a recent cyberattack remain unknown. The incident caused global disruption to the company's Microsoft environment, prompting engagement of external cybersecurity experts for threat assessment and containment.

The filing underscores the cascading operational impacts of sophisticated attacks on critical healthcare supply chain infrastructure.

Critical WordPress Plugin Vulnerability Affects 400,000+ Sites

Acquia's Drew Webber discovered an unauthenticated SQL injection flaw (CVE-2026-2413, CVSS 7.5) in the Ally WordPress plugin installed on over 400,000 sites. The vulnerability allows attackers to extract sensitive data without authentication, presenting immediate risk to affected installations.

Website operators should prioritize plugin updates to prevent unauthorized data access through this widely deployed accessibility tool.

Government and Regulatory

FBI FISA Section 702 Searches Increase 34%

New data reveals FBI searches of Americans' data collected under FISA Section 702 rose to 7,413 between December 2024 and November 2025, up from 5,518 the previous year. The 34% increase occurs amid ongoing legislative debates over surveillance program reauthorization and civil liberties protections.

UK Regulators Demand Social Media Age Verification

The Information Commissioner's Office (ICO) and Ofcom issued joint demands for social media platforms to implement stronger age verification preventing under-13 access. Platforms have until end-April to report compliance plans, with immediate action expected on protective measures.

Cyber National Mission Force Leadership Transition

Brig. Gen. Matthew Lennox from Army Cyber Command will assume command of the Cyber National Mission Force, replacing Marine Corps Maj. Gen. Lorna Mahlock who led the organization since 2024. The transition occurs amid broader leadership changes across U.S. cyber operations.

Legacy Security

Apple Patches Coruna Exploits in Legacy iOS

Apple released iOS 16.7.15 and 15.8.7 emergency updates for older iPhone and iPad models to address vulnerabilities linked to the recently disclosed Coruna exploit chain. The patches protect legacy devices from active exploitation techniques targeting outdated iOS versions.

Unstructured Data Security in AI Era

As organizational workflows migrate from traditional file servers to collaboration platforms and AI systems, security practitioners face new challenges in protecting unstructured data. Legacy file servers persist for governance and legal requirements, but operational data increasingly flows through modern cloud-native platforms requiring updated protection strategies.

Sources

  • https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/
  • https://unit42.paloaltonetworks.com/espionage-campaign-against-military-targets/
  • https://therecord.media/stryker-tells-sec-unknown-timeline-recovery
  • https://securityaffairs.com/189354/security/critical-sql-injection-bug-in-ally-plugin-threatens-400000-wordpress-sites.html
  • https://therecord.media/new-data-shows-increase-fbi-searches-on-americans
  • https://therecord.media/uk-regulators-demand-social-media-platforms-restrict-kids-access
  • https://therecord.media/cyber-national-mission-force-new-commander
  • https://securityaffairs.com/189362/security/apple-issues-emergency-fixes-for-coruna-flaws-in-older-ios-versions.html
  • https://securityaffairs.com/189368/security/beyond-file-servers-securing-unstructured-data-in-the-era-of-ai.html

Originally reported by Security Affairs, The Record, Palo Alto Unit 42

Tags

#nation-state#apt#iran#china#wiper-attacks#espionage#southeast-asia#handala

Tracked Companies

🇺🇸Apple

Related Intelligence

  • Nation-State Roundup: Iran-Nexus APT Targets Iraq Officials, Phobos Admin Pleads Guilty, Multi-Year Campaign Exposed

    highMar 6, 2026
  • APT28 Targets Ukrainian Forces While Nation-State Threats Persist Globally

    highMar 11, 2026
  • Iranian APT Groups Intensify Cyber Operations Against U.S. and Middle East Infrastructure

    highMar 7, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Privacy-Surveillance Roundup: Big Tech Brain Drain, NATO Device Certification, FBI Warrant Reform, and Iranian Hacktivism

Next Article

Iran-Criminal Collusion, Spyware Policy Shifts, and Critical n8n Zero-Click Flaw →