US FBI and Department of Justice seize Handala hacking group's websites
→Handala operators lose control of two public sites used for doxxing and disclosures
Change
US FBI and Department of Justice have seized two domains linked to the Handala hacktivist group, replaced their content with a law-enforcement seizure banner, and redirected nameserver records to FBI-controlled servers after declaring the domains were used to conduct or support malicious cyber activities on behalf of a foreign state actor.
Why it matters
US control of the two domains prevents Handala from using those sites to publish hacked materials or host doxxed personal data. Handala acknowledged the takedowns on its Telegram channel and its X account was suspended, removing two public dissemination channels the group used.
Implications
- — Digital-forensics and incident-response teams investigating the Stryker breach must immediately archive copies of the seized domains' content, DNS records, and any cached pages — failure risks permanent loss of potential forensic evidence.
- — Legal and compliance teams at domain registrars and hosting providers must immediately preserve account, transfer, and transaction logs tied to the seized domains and be prepared to comply with US law enforcement requests — failure risks impeding legal process and enforcement actions.
Unlock the full brief.
Implications — what this forces you to change
Who is affected — which roles and obligations are exposed
What to watch — binding deadlines and enforcement dates
Real-time alerts — delivered the moment a binding change is published
Clarify with AI — turn any brief into a decision for your role
Start free trial
No credit card · $29/month (~₹2,400) after trial · Active in seconds
Source
View on TechCrunch