VOID MANTICORE

VOID MANTICORE is a threat group assessed to operate on behalf of Iran’s Ministry of Intelligence and Security (MOIS).[1] Active since at least mid-2022, VOID MANTICORE has targeted government entities, critical infrastructure, and private sector organizations across Albania, Israel, and the United States.[1][2] VOID MANTICORE conducts destructive cyber operations, combining wiper attacks with hack-and-leak campaigns. The group has operated under multiple public-facing personas, including (LinkByld: C0038) in operations against Albania, Karma and Karma Below in campaigns targeting Israeli organizations, and Handala Hack, its current primary persona, which has claimed activity against Israeli and U.S. entities, including a March 2026 attack against Stryker Corporation.[1][3] VOID MANTICORE has been observed collaborating with Scarred Manticore, which has been linked to initial access operations preceding VOID MANTICORE’s activity.[4]

ID: G1055
Associated Groups: COBALT MYSTIQUE, Handala Hack, Homeland Justice, Karma, Karmabelow80, BANISHED KITTEN, Red Sandstorm
Version: 1.0
Created: 20 April 2026
Last Modified: 23 April 2026

Associated Group Descriptions

Name Description
COBALT MYSTIQUE

[5]

Handala Hack

[3]

Homeland Justice

[3]

Karma

[3]

Karmabelow80

[5]

BANISHED KITTEN

[1]

Red Sandstorm

[1]

Campaigns

Techniques Used

Domain ID Name Use
Enterprise T1134 .001 Access Token Manipulation: Token Impersonation/Theft

During HomeLand Justice, threat actors used custom tooling to acquire tokens using ImpersonateLoggedOnUser/SetThreadToken.[7]

Enterprise T1087 .002 Account Discovery: Domain Account

VOID MANTICORE has utilized ADRecon to enumerate the active directory environment.[1]

.003 Account Discovery: Email Account

During HomeLand Justice, threat actors used compromised Exchange accounts to search mailboxes for administrator accounts.[8]

Enterprise T1098 Account Manipulation

VOID MANTICORE has leveraged access to administrative control systems to achieve disruptive effects, consistent with administrative account abuse or privilege escalation within existing access.[4][9]

.002 Additional Email Delegate Permissions

During HomeLand Justice, threat actors added the ApplicationImpersonation management role to accounts under their control to impersonate users and take ownership of targeted mailboxes.[7]

Enterprise T1583 .001 Acquire Infrastructure: Domains

VOID MANTICORE has registered domains for messaging purposes.[10] VOID MANTICORE has created typosquatted domains and sub-domains in attempts to avoid detection or draw suspicion.[3][11] VOID MANTICORE has also purchased domains leveraging cryptocurrency platforms to include LiteCoin and Ramzinex.[3] VOID MANTICORE has registered and rotated domains to support public-facing dissemination infrastructure, replacing disrupted domains with new registrations.[4]

.003 Acquire Infrastructure: Virtual Private Server

VOID MANTICORE has utilized VPS solutions for C2.[1]

.004 Acquire Infrastructure: Server

VOID MANTICORE has leveraged backend servers within Iran.[3]

.006 Acquire Infrastructure: Web Services

VOID MANTICORE has obtained access to commercial VPN services to launch malicious activity.[1][10] VOID MANTICORE has also leveraged Starlink internet services.[1] VOID MANTICORE has used operator-controlled Telegram bots and channels as C2 infrastructure.[4]

Enterprise T1595 .002 Active Scanning: Vulnerability Scanning

VOID MANTICORE has scanned victim environments for susceptibility to vulnerability exploitation.[3]

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

VOID MANTICORE has utilized HTTPS for communication to C2 domains.[11]

Enterprise T1560 .001 Archive Collected Data: Archive via Utility

VOID MANTICORE has stored collected data in a password protected compressed file prior to exfiltration.[11]

Enterprise T1123 Audio Capture

VOID MANTICORE has gathered audio during a Zoom session.[11]

Enterprise T1119 Automated Collection

VOID MANTICORE conducted large-scale data exfiltration in the Stryker operation, consistent with automated or scripted collection against enterprise systems.[4]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

VOID MANTICORE has created Windows Registry entries to autorun stage two malware payloads to maintain persistence.[11]

Enterprise T1110 Brute Force

VOID MANTICORE has conducted brute-force attempts against organizational VPN infrastructure.[1]

.001 Password Guessing

VOID MANTICORE has conducted password guessing to gain initial access.[4]

.004 Credential Stuffing

VOID MANTICORE has utilized credential stuffing attacks to obtain initial access to victim environments.[4]

Enterprise T1651 Cloud Administration Command

VOID MANTICORE has abused built-in remote wipe or factory reset commands to wipe devices managed within an organization’s Cloud management solution impacting laptops, servers, and mobile devices.[2]

Enterprise T1059 .001 Command and Scripting Interpreter: PowerShell

VOID MANTICORE has utilized PowerShell to execute malware in victim environments.[3][11]

During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.[8][7]

.003 Command and Scripting Interpreter: Windows Command Shell

During HomeLand Justice, threat actors used Windows batch files for persistence and execution.[8][7]

.006 Command and Scripting Interpreter: Python

VOID MANTICORE has utilized Python scripts to execute its malicious payloads.[11]

Enterprise T1485 Data Destruction

VOID MANTICORE has conducted data wiping attacks on compromised systems.[1][10][3][2] VOID MANTICORE has also manually deleted files from compromised hosts, to include selecting all files and then deleting them.[1][3]

Enterprise T1486 Data Encrypted for Impact

VOID MANTICORE has utilized legitimate disk encryption utilities to increase likelihood of encrypting system drives and reduce system recovery efforts.[1][3]

During HomeLand Justice, threat actors used ROADSWEEP ransomware to encrypt files on targeted systems.[6][8][7]

Enterprise T1213 .002 Data from Information Repositories: Sharepoint

VOID MANTICORE has accessed victim’s public facing SharePoint servers and exfiltrated data.[3]

Enterprise T1005 Data from Local System

VOID MANTICORE has collected cached data and files from within the victim environment.[10][3][11]

Enterprise T1074 Data Staged

VOID MANTICORE has staged compressed files in specified locations prior to exfiltration over C2.[11]

Enterprise T1587 .001 Develop Capabilities: Malware

VOID MANTICORE has utilized custom-malware and wipers to include BiBi Wiper.[3]

Enterprise T1686 .003 Disable or Modify System Firewall: Windows Host Firewall

VOID MANTICORE has disabled Windows Defender protections to allow for follow-on activities within the compromised host.[1]

Enterprise T1685 Disable or Modify Tools

During HomeLand Justice, threat actors modified and disabled components of endpoint detection and response (EDR) solutions including Microsoft Defender Antivirus.[7]

.001 Disable or Modify Windows Event Log

During HomeLand Justice, threat actors deleted Windows events and application logs.[7]

Enterprise T1561 .001 Disk Wipe: Disk Content Wipe

VOID MANTICORE has utilized a disk wiping utility to facilitate destructive actions on victim servers.[3] VOID MANTICORE has also utilized legitimate remote disk wiping commands.[10]

.002 Disk Wipe: Disk Structure Wipe

VOID MANTICORE has deployed custom wipers that overwrite system files and the host devices master boot records (MBR) to corrupt or destroy files.[1]

During HomeLand Justice, threat actors used a version of ZeroCleare to wipe disk drives on targeted hosts.[8][7]

Enterprise T1484 .001 Domain or Tenant Policy Modification: Group Policy Modification

VOID MANTICORE had utilized Group Policy logon scripts to distribute the malicious payloads to victim devices through the execution of a batch file.[1]

Enterprise T1114 .002 Email Collection: Remote Email Collection

VOID MANTICORE has gathered victim email-content from victim servers.[3]

During HomeLand Justice, threat actors made multiple HTTP POST requests to the Exchange servers of the victim organization to transfer data.[8]

Enterprise T1585 .001 Establish Accounts: Social Media Accounts

VOID MANTICORE has created Telegram Accounts.[11] VOID MANTICORE has also leveraged online personas such as Handala Hack, Karma, and Homeland Justice on social media to include Telegram.[1][10][3] VOID MANTICORE has established and maintained social media accounts on Twitter/X and Telegram to amplify operational claims and stolen data disclosures.[4]

.002 Establish Accounts: Email Accounts

VOID MANTICORE has created email accounts to send threatening messages to victims to include ‘Handala_Team[@]outlook[.]com’.[3]

Enterprise T1041 Exfiltration Over C2 Channel

VOID MANTICORE malware has exfiltrated collected data via Telegram bot C2 channels using encrypted communications.[4]

During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.[8]

Enterprise T1190 Exploit Public-Facing Application

VOID MANTICORE has exploited public facing vulnerabilities within victim environments to include SharePoint CVE-2019-0604.[3]

For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.[8]

Enterprise T1133 External Remote Services

VOID MANTICORE has leveraged public facing VPN infrastructure to gain initial access to victim environments.[1]

Enterprise T1657 Financial Theft

VOID MANTICORE has conducted data exfiltration and posted stolen information on data leak sites for the purposes of financial and political extortion.[10][3] VOID MANTICORE has also sold stolen data to prospective buyers for cryptocurrency.[3]

Enterprise T1589 Gather Victim Identity Information

VOID MANTICORE has gathered details on their intended victims to aid in social engineering efforts for leveraging tailored themes of attacks.[11]

Enterprise T1564 .003 Hide Artifacts: Hidden Window

VOID MANTICORE has utilized PowerShell scripts that run without notifying the user of its execution to include -nop -w hidden- ep bypass -enc.[11]

Enterprise T1105 Ingress Tool Transfer

VOID MANTICORE has deployed additional payloads from dedicated C2 servers.[1][3][11] VOID MANTICORE has also downloaded legitimate tools and software from publicly available services.[1] VOID MANTICORE had utilized VeraCrypt a legitimate disk encrypting utility that was downloaded directly from the website.[1]

During HomeLand Justice, threat actors used web shells to download files to compromised infrastructure.[7]

Enterprise T1490 Inhibit System Recovery

VOID MANTICORE has deleted virtual machines directly from the virtualization platform.[1]

Enterprise T1570 Lateral Tool Transfer

During HomeLand Justice, threat actors initiated a process named Mellona.exe to spread the ROADSWEEP file encryptor and a persistence script to a list of internal machines.[8]

Enterprise T1036 .004 Masquerading: Masquerade Task or Service

VOID MANTICORE has masqueraded as commonly used programs and services on Windows hosts.[11]

.005 Masquerading: Match Legitimate Resource Name or Location

VOID MANTICORE has masqueraded malicious payloads to resemble legitimate applications.[3][11] VOID MANTICORE has leveraged malicious payloads that use nomenclature associated with common applications that include Pictory, KeePass, WhatsApp, and Telegram.[11]

During HomeLand Justice, threat actors renamed ROADSWEEP to GoXML.exe and ZeroCleare to cl.exe.[8][6]

Enterprise T1046 Network Service Discovery

During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.[8][7]

Enterprise T1027 .015 Obfuscated Files or Information: Compression

VOID MANTICORE has compressed their payloads by leveraging zip files.[11]

Enterprise T1588 .001 Obtain Capabilities: Malware

VOID MANTICORE has developed or obtained trojanized applications used for persistent surveillance of targeted individuals.[4]

.002 Obtain Capabilities: Tool

VOID MANTICORE has obtained and utilized commercial VPN services, open-source software and publicly available offensive security tools to facilitate malicious activities.[1]

During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.[8][7]

.003 Obtain Capabilities: Code Signing Certificates

During HomeLand Justice, threat actors used tools with legitimate code signing certificates. [8]

Enterprise T1003 .001 OS Credential Dumping: LSASS Memory

VOID MANTICORE has dumped LSASS credentials using comsvcs.dll via rundll32.exe.[1]

During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.[8]

Enterprise T1566 Phishing

VOID MANTICORE has emailed victims threatening messages.[3] VOID MANTICORE has used phishing as an initial access vector.[4]

Enterprise T1572 Protocol Tunneling

VOID MANTICORE has used tunneling tools to facilitate destructive attacks on compromised devices.[1]

Enterprise T1219 .002 Remote Access Tools: Remote Desktop Software

VOID MANTICORE has installed NetBird on victim devices to create a mesh network that facilitated control of several victim devices at once.[1]

Enterprise T1021 .001 Remote Services: Remote Desktop Protocol

VOID MANTICORE has used RDP to move laterally within the victim environment.[1]

During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.[8][7]

.002 Remote Services: SMB/Windows Admin Shares

During HomeLand Justice, threat actors used SMB for lateral movement.[8][7]

Enterprise T1113 Screen Capture

VOID MANTICORE has captured screen content during an active Zoom session.[11]

Enterprise T1679 Selective Exclusion

VOID MANTICORE has avoided interacting with specific directories in order to reduce the likelihood of detection.[11]

Enterprise T1505 .003 Server Software Component: Web Shell

For HomeLand Justice, threat actors used .aspx webshells named pickers.aspx, error4.aspx, and ClientBin.aspx, to maintain persistence.[8][7]

Enterprise T1684 .001 Social Engineering: Impersonation

VOID MANTICORE has impersonated individuals familiar to the victim and technical support associated with social messaging services.[11]

Enterprise T1072 Software Deployment Tools

VOID MANTICORE has leveraged legitimate built-in features of cloud-based management platforms to include mobile device management (MDM) and Remote Monitoring and Management (RMM) solutions.[10][2] VOID MANTICORE has also initiated built-in remote wipe instructions using a privileged account within Microsoft Intune.[10][2]

Enterprise T1082 System Information Discovery

VOID MANTICORE has gathered system information and disseminated it back to C2.[11]

Enterprise T1199 Trusted Relationship

VOID MANTICORE has targeted IT and service providers in an effort to obtain credentials, relying largely on compromised VPN accounts for initial access.[1]

Enterprise T1552 .002 Unsecured Credentials: Credentials in Registry

VOID MANTICORE had exported credentials from registry hives to include those stored in HKLM.[1]

Enterprise T1204 .002 User Execution: Malicious File

VOID MANTICORE has delivered malicious payloads that initiate through user execution to include interaction with a masqueraded file.[3][11] VOID MANTICORE has used trojanized application lures to induce targets into executing malware enabling persistent surveillance.[4]

Enterprise T1078 Valid Accounts

VOID MANTICORE has leveraged valid accounts to log into VPN infrastructure.[1] VOID MANTICORE has used compromised valid credentials to gain access to management infrastructure and enterprise control systems.[4] VOID MANTICORE has also validated and tested authentication using compromised credentials prior to malicious actions.[1]

During HomeLand Justice, threat actors used a compromised Exchange account to search mailboxes and create new Exchange accounts.[8]

.001 Default Accounts

During HomeLand Justice, threat actors used the built-in administrator account to move laterally using RDP and Impacket.[7]

.002 Domain Accounts

VOID MANTICORE has used previously compromised Domain Administrator credentials to maintain persistent access.[1]

.004 Cloud Accounts

VOID MANTICORE has leveraged privileged cloud accounts to access cloud-based management consoles to include Microsoft Intune.[2] VOID MANTICORE has also compromised existing accounts within the Microsoft Entra ID environment.[12]

Enterprise T1125 Video Capture

VOID MANTICORE has collected video from compromised victim devices.[11]

Enterprise T1102 Web Service

VOID MANTICORE has utilized Telegram API for C2.[3][11]

Enterprise T1047 Windows Management Instrumentation

VOID MANTICORE has utilized WMIC to log into the victim host and create a process process call create "cmd.exe /c copy \\?\\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system c:\users\public".[1]

During HomeLand Justice, threat actors used WMI to modify Windows Defender settings.[7]

Software

ID Name References Techniques
S1149 CHIMNEYSWEEP [6] Abuse Elevation Control Mechanism: Bypass User Account Control, Application Layer Protocol: Web Protocols, Clipboard Data, Command and Scripting Interpreter: Visual Basic, Command and Scripting Interpreter: PowerShell, Data Encoding: Non-Standard Encoding, Data from Local System, Data Staged: Local Data Staging, Deobfuscate/Decode Files or Information, Execution Guardrails, Exfiltration Over C2 Channel, File and Directory Discovery, Indicator Removal: Timestomp, Ingress Tool Transfer, Input Capture: Keylogging, Modify Registry, Native API, Obfuscated Files or Information, Obfuscated Files or Information: Embedded Payloads, Obfuscated Files or Information: Binary Padding, Obfuscated Files or Information: Dynamic API Resolution, Peripheral Device Discovery, Process Discovery, Scheduled Task/Job: Scheduled Task, Screen Capture, Software Discovery: Security Software Discovery, Subvert Trust Controls: Code Signing, System Binary Proxy Execution: CMSTP, System Owner/User Discovery, System Shutdown/Reboot, Web Service
S0095 ftp [8] Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol, Ingress Tool Transfer, Lateral Tool Transfer
S0357 Impacket [7] Adversary-in-the-Middle: Name Resolution Poisoning and SMB Relay, Lateral Tool Transfer, Network Sniffing, OS Credential Dumping: NTDS, OS Credential Dumping: LSASS Memory, OS Credential Dumping: Security Account Manager, OS Credential Dumping: LSA Secrets, Steal or Forge Kerberos Tickets: Kerberoasting, Steal or Forge Kerberos Tickets: Ccache Files, System Services: Service Execution, Windows Management Instrumentation
S0002 Mimikatz [8][7] Access Token Manipulation: SID-History Injection, Account Manipulation, Boot or Logon Autostart Execution: Security Support Provider, Credentials from Password Stores, Credentials from Password Stores: Credentials from Web Browsers, Credentials from Password Stores: Windows Credential Manager, OS Credential Dumping: DCSync, OS Credential Dumping: Security Account Manager, OS Credential Dumping: LSASS Memory, OS Credential Dumping: LSA Secrets, Rogue Domain Controller, Steal or Forge Authentication Certificates, Steal or Forge Kerberos Tickets: Golden Ticket, Steal or Forge Kerberos Tickets: Silver Ticket, Unsecured Credentials: Private Keys, Use Alternate Authentication Material: Pass the Hash, Use Alternate Authentication Material: Pass the Ticket
S0364 RawDisk [8][7] Data Destruction, Disk Wipe: Disk Structure Wipe, Disk Wipe: Disk Content Wipe
S1150 ROADSWEEP [6] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Command and Scripting Interpreter: Windows Command Shell, Data Encrypted for Impact, Defacement: Internal Defacement, Deobfuscate/Decode Files or Information, Execution Guardrails, File and Directory Discovery, Indicator Removal: File Deletion, Inhibit System Recovery, Inter-Process Communication, Local Storage Discovery, Obfuscated Files or Information: Encrypted/Encoded File, Peripheral Device Discovery, Service Stop, Subvert Trust Controls: Code Signing
S1151 ZeroCleare [8][7] Command and Scripting Interpreter, Command and Scripting Interpreter: PowerShell, Disk Wipe: Disk Structure Wipe, Exploitation for Privilege Escalation, Indicator Removal: File Deletion, Local Storage Discovery, Native API, Subvert Trust Controls: Code Signing

References