VOID MANTICORE is a threat group assessed to operate on behalf of Iran’s Ministry of Intelligence and Security (MOIS).[1] Active since at least mid-2022, VOID MANTICORE has targeted government entities, critical infrastructure, and private sector organizations across Albania, Israel, and the United States.[1][2] VOID MANTICORE conducts destructive cyber operations, combining wiper attacks with hack-and-leak campaigns. The group has operated under multiple public-facing personas, including HomeLand Justice in operations against Albania, Karma and Karma Below in campaigns targeting Israeli organizations, and Handala Hack, its current primary persona, which has claimed activity against Israeli and U.S. entities, including a March 2026 attack against Stryker Corporation.[1][3] VOID MANTICORE has been observed collaborating with Scarred Manticore, which has been linked to initial access operations preceding VOID MANTICORE’s activity.[4]
| Name | Description |
|---|---|
| COBALT MYSTIQUE | |
| Handala Hack | |
| Homeland Justice | |
| Karma | |
| Karmabelow80 | |
| BANISHED KITTEN | |
| Red Sandstorm |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1134 | .001 | Access Token Manipulation: Token Impersonation/Theft |
During HomeLand Justice, threat actors used custom tooling to acquire tokens using |
| Enterprise | T1087 | .002 | Account Discovery: Domain Account |
VOID MANTICORE has utilized ADRecon to enumerate the active directory environment.[1] |
| .003 | Account Discovery: Email Account |
During HomeLand Justice, threat actors used compromised Exchange accounts to search mailboxes for administrator accounts.[8] |
||
| Enterprise | T1098 | Account Manipulation |
VOID MANTICORE has leveraged access to administrative control systems to achieve disruptive effects, consistent with administrative account abuse or privilege escalation within existing access.[4][9] |
|
| .002 | Additional Email Delegate Permissions |
During HomeLand Justice, threat actors added the |
||
| Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
VOID MANTICORE has registered domains for messaging purposes.[10] VOID MANTICORE has created typosquatted domains and sub-domains in attempts to avoid detection or draw suspicion.[3][11] VOID MANTICORE has also purchased domains leveraging cryptocurrency platforms to include LiteCoin and Ramzinex.[3] VOID MANTICORE has registered and rotated domains to support public-facing dissemination infrastructure, replacing disrupted domains with new registrations.[4] |
| .003 | Acquire Infrastructure: Virtual Private Server |
VOID MANTICORE has utilized VPS solutions for C2.[1] |
||
| .004 | Acquire Infrastructure: Server |
VOID MANTICORE has leveraged backend servers within Iran.[3] |
||
| .006 | Acquire Infrastructure: Web Services |
VOID MANTICORE has obtained access to commercial VPN services to launch malicious activity.[1][10] VOID MANTICORE has also leveraged Starlink internet services.[1] VOID MANTICORE has used operator-controlled Telegram bots and channels as C2 infrastructure.[4] |
||
| Enterprise | T1595 | .002 | Active Scanning: Vulnerability Scanning |
VOID MANTICORE has scanned victim environments for susceptibility to vulnerability exploitation.[3] |
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
VOID MANTICORE has utilized HTTPS for communication to C2 domains.[11] |
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
VOID MANTICORE has stored collected data in a password protected compressed file prior to exfiltration.[11] |
| Enterprise | T1123 | Audio Capture |
VOID MANTICORE has gathered audio during a Zoom session.[11] |
|
| Enterprise | T1119 | Automated Collection |
VOID MANTICORE conducted large-scale data exfiltration in the Stryker operation, consistent with automated or scripted collection against enterprise systems.[4] |
|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
VOID MANTICORE has created Windows Registry entries to autorun stage two malware payloads to maintain persistence.[11] |
| Enterprise | T1110 | Brute Force |
VOID MANTICORE has conducted brute-force attempts against organizational VPN infrastructure.[1] |
|
| .001 | Password Guessing |
VOID MANTICORE has conducted password guessing to gain initial access.[4] |
||
| .004 | Credential Stuffing |
VOID MANTICORE has utilized credential stuffing attacks to obtain initial access to victim environments.[4] |
||
| Enterprise | T1651 | Cloud Administration Command |
VOID MANTICORE has abused built-in remote wipe or factory reset commands to wipe devices managed within an organization’s Cloud management solution impacting laptops, servers, and mobile devices.[2] |
|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
VOID MANTICORE has utilized PowerShell to execute malware in victim environments.[3][11] During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.[8][7] |
| .003 | Command and Scripting Interpreter: Windows Command Shell |
During HomeLand Justice, threat actors used Windows batch files for persistence and execution.[8][7] |
||
| .006 | Command and Scripting Interpreter: Python |
VOID MANTICORE has utilized Python scripts to execute its malicious payloads.[11] |
||
| Enterprise | T1485 | Data Destruction |
VOID MANTICORE has conducted data wiping attacks on compromised systems.[1][10][3][2] VOID MANTICORE has also manually deleted files from compromised hosts, to include selecting all files and then deleting them.[1][3] |
|
| Enterprise | T1486 | Data Encrypted for Impact |
VOID MANTICORE has utilized legitimate disk encryption utilities to increase likelihood of encrypting system drives and reduce system recovery efforts.[1][3] During HomeLand Justice, threat actors used ROADSWEEP ransomware to encrypt files on targeted systems.[6][8][7] |
|
| Enterprise | T1213 | .002 | Data from Information Repositories: Sharepoint |
VOID MANTICORE has accessed victim’s public facing SharePoint servers and exfiltrated data.[3] |
| Enterprise | T1005 | Data from Local System |
VOID MANTICORE has collected cached data and files from within the victim environment.[10][3][11] |
|
| Enterprise | T1074 | Data Staged |
VOID MANTICORE has staged compressed files in specified locations prior to exfiltration over C2.[11] |
|
| Enterprise | T1587 | .001 | Develop Capabilities: Malware |
VOID MANTICORE has utilized custom-malware and wipers to include BiBi Wiper.[3] |
| Enterprise | T1686 | .003 | Disable or Modify System Firewall: Windows Host Firewall |
VOID MANTICORE has disabled Windows Defender protections to allow for follow-on activities within the compromised host.[1] |
| Enterprise | T1685 | Disable or Modify Tools |
During HomeLand Justice, threat actors modified and disabled components of endpoint detection and response (EDR) solutions including Microsoft Defender Antivirus.[7] |
|
| .001 | Disable or Modify Windows Event Log |
During HomeLand Justice, threat actors deleted Windows events and application logs.[7] |
||
| Enterprise | T1561 | .001 | Disk Wipe: Disk Content Wipe |
VOID MANTICORE has utilized a disk wiping utility to facilitate destructive actions on victim servers.[3] VOID MANTICORE has also utilized legitimate remote disk wiping commands.[10] |
| .002 | Disk Wipe: Disk Structure Wipe |
VOID MANTICORE has deployed custom wipers that overwrite system files and the host devices master boot records (MBR) to corrupt or destroy files.[1] During HomeLand Justice, threat actors used a version of ZeroCleare to wipe disk drives on targeted hosts.[8][7] |
||
| Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
VOID MANTICORE had utilized Group Policy logon scripts to distribute the malicious payloads to victim devices through the execution of a batch file.[1] |
| Enterprise | T1114 | .002 | Email Collection: Remote Email Collection |
VOID MANTICORE has gathered victim email-content from victim servers.[3] During HomeLand Justice, threat actors made multiple HTTP POST requests to the Exchange servers of the victim organization to transfer data.[8] |
| Enterprise | T1585 | .001 | Establish Accounts: Social Media Accounts |
VOID MANTICORE has created Telegram Accounts.[11] VOID MANTICORE has also leveraged online personas such as Handala Hack, Karma, and Homeland Justice on social media to include Telegram.[1][10][3] VOID MANTICORE has established and maintained social media accounts on Twitter/X and Telegram to amplify operational claims and stolen data disclosures.[4] |
| .002 | Establish Accounts: Email Accounts |
VOID MANTICORE has created email accounts to send threatening messages to victims to include ‘Handala_Team[@]outlook[.]com’.[3] |
||
| Enterprise | T1041 | Exfiltration Over C2 Channel |
VOID MANTICORE malware has exfiltrated collected data via Telegram bot C2 channels using encrypted communications.[4] During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.[8] |
|
| Enterprise | T1190 | Exploit Public-Facing Application |
VOID MANTICORE has exploited public facing vulnerabilities within victim environments to include SharePoint CVE-2019-0604.[3] For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.[8] |
|
| Enterprise | T1133 | External Remote Services |
VOID MANTICORE has leveraged public facing VPN infrastructure to gain initial access to victim environments.[1] |
|
| Enterprise | T1657 | Financial Theft |
VOID MANTICORE has conducted data exfiltration and posted stolen information on data leak sites for the purposes of financial and political extortion.[10][3] VOID MANTICORE has also sold stolen data to prospective buyers for cryptocurrency.[3] |
|
| Enterprise | T1589 | Gather Victim Identity Information |
VOID MANTICORE has gathered details on their intended victims to aid in social engineering efforts for leveraging tailored themes of attacks.[11] |
|
| Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
VOID MANTICORE has utilized PowerShell scripts that run without notifying the user of its execution to include |
| Enterprise | T1105 | Ingress Tool Transfer |
VOID MANTICORE has deployed additional payloads from dedicated C2 servers.[1][3][11] VOID MANTICORE has also downloaded legitimate tools and software from publicly available services.[1] VOID MANTICORE had utilized VeraCrypt a legitimate disk encrypting utility that was downloaded directly from the website.[1] During HomeLand Justice, threat actors used web shells to download files to compromised infrastructure.[7] |
|
| Enterprise | T1490 | Inhibit System Recovery |
VOID MANTICORE has deleted virtual machines directly from the virtualization platform.[1] |
|
| Enterprise | T1570 | Lateral Tool Transfer |
During HomeLand Justice, threat actors initiated a process named Mellona.exe to spread the ROADSWEEP file encryptor and a persistence script to a list of internal machines.[8] |
|
| Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
VOID MANTICORE has masqueraded as commonly used programs and services on Windows hosts.[11] |
| .005 | Masquerading: Match Legitimate Resource Name or Location |
VOID MANTICORE has masqueraded malicious payloads to resemble legitimate applications.[3][11] VOID MANTICORE has leveraged malicious payloads that use nomenclature associated with common applications that include Pictory, KeePass, WhatsApp, and Telegram.[11] During HomeLand Justice, threat actors renamed ROADSWEEP to GoXML.exe and ZeroCleare to cl.exe.[8][6] |
||
| Enterprise | T1046 | Network Service Discovery |
During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.[8][7] |
|
| Enterprise | T1027 | .015 | Obfuscated Files or Information: Compression |
VOID MANTICORE has compressed their payloads by leveraging zip files.[11] |
| Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
VOID MANTICORE has developed or obtained trojanized applications used for persistent surveillance of targeted individuals.[4] |
| .002 | Obtain Capabilities: Tool |
VOID MANTICORE has obtained and utilized commercial VPN services, open-source software and publicly available offensive security tools to facilitate malicious activities.[1] During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.[8][7] |
||
| .003 | Obtain Capabilities: Code Signing Certificates |
During HomeLand Justice, threat actors used tools with legitimate code signing certificates. [8] |
||
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
VOID MANTICORE has dumped LSASS credentials using During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.[8] |
| Enterprise | T1566 | Phishing |
VOID MANTICORE has emailed victims threatening messages.[3] VOID MANTICORE has used phishing as an initial access vector.[4] |
|
| Enterprise | T1572 | Protocol Tunneling |
VOID MANTICORE has used tunneling tools to facilitate destructive attacks on compromised devices.[1] |
|
| Enterprise | T1219 | .002 | Remote Access Tools: Remote Desktop Software |
VOID MANTICORE has installed NetBird on victim devices to create a mesh network that facilitated control of several victim devices at once.[1] |
| Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
VOID MANTICORE has used RDP to move laterally within the victim environment.[1] During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.[8][7] |
| .002 | Remote Services: SMB/Windows Admin Shares |
During HomeLand Justice, threat actors used SMB for lateral movement.[8][7] |
||
| Enterprise | T1113 | Screen Capture |
VOID MANTICORE has captured screen content during an active Zoom session.[11] |
|
| Enterprise | T1679 | Selective Exclusion |
VOID MANTICORE has avoided interacting with specific directories in order to reduce the likelihood of detection.[11] |
|
| Enterprise | T1505 | .003 | Server Software Component: Web Shell |
For HomeLand Justice, threat actors used .aspx webshells named pickers.aspx, error4.aspx, and ClientBin.aspx, to maintain persistence.[8][7] |
| Enterprise | T1684 | .001 | Social Engineering: Impersonation |
VOID MANTICORE has impersonated individuals familiar to the victim and technical support associated with social messaging services.[11] |
| Enterprise | T1072 | Software Deployment Tools |
VOID MANTICORE has leveraged legitimate built-in features of cloud-based management platforms to include mobile device management (MDM) and Remote Monitoring and Management (RMM) solutions.[10][2] VOID MANTICORE has also initiated built-in remote wipe instructions using a privileged account within Microsoft Intune.[10][2] |
|
| Enterprise | T1082 | System Information Discovery |
VOID MANTICORE has gathered system information and disseminated it back to C2.[11] |
|
| Enterprise | T1199 | Trusted Relationship |
VOID MANTICORE has targeted IT and service providers in an effort to obtain credentials, relying largely on compromised VPN accounts for initial access.[1] |
|
| Enterprise | T1552 | .002 | Unsecured Credentials: Credentials in Registry |
VOID MANTICORE had exported credentials from registry hives to include those stored in HKLM.[1] |
| Enterprise | T1204 | .002 | User Execution: Malicious File |
VOID MANTICORE has delivered malicious payloads that initiate through user execution to include interaction with a masqueraded file.[3][11] VOID MANTICORE has used trojanized application lures to induce targets into executing malware enabling persistent surveillance.[4] |
| Enterprise | T1078 | Valid Accounts |
VOID MANTICORE has leveraged valid accounts to log into VPN infrastructure.[1] VOID MANTICORE has used compromised valid credentials to gain access to management infrastructure and enterprise control systems.[4] VOID MANTICORE has also validated and tested authentication using compromised credentials prior to malicious actions.[1] During HomeLand Justice, threat actors used a compromised Exchange account to search mailboxes and create new Exchange accounts.[8] |
|
| .001 | Default Accounts |
During HomeLand Justice, threat actors used the built-in administrator account to move laterally using RDP and Impacket.[7] |
||
| .002 | Domain Accounts |
VOID MANTICORE has used previously compromised Domain Administrator credentials to maintain persistent access.[1] |
||
| .004 | Cloud Accounts |
VOID MANTICORE has leveraged privileged cloud accounts to access cloud-based management consoles to include Microsoft Intune.[2] VOID MANTICORE has also compromised existing accounts within the Microsoft Entra ID environment.[12] |
||
| Enterprise | T1125 | Video Capture |
VOID MANTICORE has collected video from compromised victim devices.[11] |
|
| Enterprise | T1102 | Web Service |
VOID MANTICORE has utilized Telegram API for C2.[3][11] |
|
| Enterprise | T1047 | Windows Management Instrumentation |
VOID MANTICORE has utilized WMIC to log into the victim host and create a process During HomeLand Justice, threat actors used WMI to modify Windows Defender settings.[7] |
|