BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /FBI Director's Email Compromised by Iranian Hackers as Microsoft Patches DNS Security Flaws

FBI Director's Email Compromised by Iranian Hackers as Microsoft Patches DNS Security Flaws

highVulnerabilities & Exploits|March 29, 20262 min read

Originally reported by The Hacker News, MSRC Security Updates

#iran-apt#fbi-breach#dns-vulnerabilities#microsoft-patches#handala-hack-team#dnssec#memory-leaks#redos
Share

TL;DR

The Handala Hack Team successfully compromised FBI Director Kash Patel's personal email and leaked documents online. Meanwhile, Microsoft released patches for seven CVEs including critical DNS security flaws that could enable memory leaks and denial-of-service attacks.

Why high?

The compromise of the FBI Director's personal email by Iranian threat actors represents a significant intelligence breach with national security implications, warranting high severity despite being a targeted attack.

Iranian Hackers Breach FBI Director's Personal Email

Threat actors linked to Iran successfully compromised the personal email account of FBI Director Kash Patel, according to reporting from The Hacker News. The Handala Hack Team claimed responsibility for the breach and leaked a cache of photos and documents to the internet.

The group posted on their website that Patel "will now find his name among the list of successfully hacked victims." The breach represents a significant intelligence gathering operation targeting senior U.S. law enforcement leadership, though the full scope of compromised information remains unclear.

Microsoft Patches Critical DNS Security Vulnerabilities

Microsoft's March security update addressed multiple DNS-related vulnerabilities that could impact enterprise infrastructure:

Memory Management Flaws:

  • CVE-2026-3104: Memory leak vulnerability in DNSSEC proof preparation code
  • CVE-2026-1519: Excessive NSEC3 iterations causing high CPU load during insecure delegation validation

Service Availability Issues:

  • CVE-2026-3119: Authenticated TKEY record queries may cause unexpected named service termination

These vulnerabilities could allow attackers to exhaust system resources or disrupt DNS resolution services in enterprise environments.

Additional Component Vulnerabilities Patched

Microsoft also addressed several library-level security issues:

Graphics Processing:

  • CVE-2026-33636: Out-of-bounds read vulnerability in LIBPNG's ARM NEON palette expansion on AArch64 systems

Regular Expression Processing:

  • CVE-2026-33671: ReDoS vulnerability in Picomatch library via extglob quantifiers
  • CVE-2026-4833: Recursion vulnerability in Orc discount Markdown compiler

These component-level flaws could enable denial-of-service attacks or memory corruption in applications using the affected libraries.

Incomplete CVE Information

CVE-2025-67030 was published in Microsoft's security update guide but lacks detailed vulnerability information at time of publication.

Sources

  • Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack
  • CVE-2026-3104
  • CVE-2026-33636
  • CVE-2025-67030
  • CVE-2026-1519
  • CVE-2026-3119
  • CVE-2026-33671
  • CVE-2026-4833

Originally reported by The Hacker News, MSRC Security Updates

Tags

#iran-apt#fbi-breach#dns-vulnerabilities#microsoft-patches#handala-hack-team#dnssec#memory-leaks#redos

Related Intelligence

  • Microsoft Patches RCE in Windows RRAS, Storm-2561 Deploys Trojan VPN Clients via SEO Poisoning

    highMar 14, 2026
  • Weekly Vulnerability Roundup: iOS Exploit Kit Reuses Triangulation Code, WebRTC Skimmer Bypasses CSP, Apple Patches 85 Flaws

    highMar 26, 2026
  • Nation-State Roundup: Iran-linked Handala Targets FBI Director, ShinyHunters Breaches EU Commission, Apple Warns of Active Web Exploits

    highMar 29, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Federal Apps Deploy Sanctioned Tracking SDKs and Excessive Permissions

Next Article

AI-Powered Malware Development Reaches Operational Maturity with VoidLink Framework→