VOID MANTICORE is a threat group assessed to operate on behalf of Iran’s Ministry of Intelligence and Security (MOIS).[1] Active since at least mid-2022, VOID MANTICORE has targeted government entities, critical infrastructure, and private sector organizations across Albania, Israel, and the United States.[1][2] VOID MANTICORE conducts destructive cyber operations, combining wiper attacks with hack-and-leak campaigns. The group has operated under multiple public-facing personas, including (LinkByld: C0038) in operations against Albania, Karma and Karma Below in campaigns targeting Israeli organizations, and Handala Hack, its current primary persona, which has claimed activity against Israeli and U.S. entities, including a March 2026 attack against Stryker Corporation.[1][3] VOID MANTICORE has been observed collaborating with Scarred Manticore, which has been linked to initial access operations preceding VOID MANTICORE’s activity.[4]
| Name | Description |
|---|---|
| COBALT MYSTIQUE | |
| Handala Hack | |
| Homeland Justice | |
| Karma | |
| Karmabelow80 | |
| BANISHED KITTEN | |
| Red Sandstorm |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1134 | .001 | Access Token Manipulation: Token Impersonation/Theft |
During HomeLand Justice, threat actors used custom tooling to acquire tokens using |
| Enterprise | T1087 | .002 | Account Discovery: Domain Account |
VOID MANTICORE has utilized ADRecon to enumerate the active directory environment.[1] |
| .003 | Account Discovery: Email Account |
During HomeLand Justice, threat actors used compromised Exchange accounts to search mailboxes for administrator accounts.[8] |
||
| Enterprise | T1098 | Account Manipulation |
VOID MANTICORE has leveraged access to administrative control systems to achieve disruptive effects, consistent with administrative account abuse or privilege escalation within existing access.[4][9] |
|
| .002 | Additional Email Delegate Permissions |
During HomeLand Justice, threat actors added the |
||
| Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
VOID MANTICORE has registered domains for messaging purposes.[10] VOID MANTICORE has created typosquatted domains and sub-domains in attempts to avoid detection or draw suspicion.[3][11] VOID MANTICORE has also purchased domains leveraging cryptocurrency platforms to include LiteCoin and Ramzinex.[3] VOID MANTICORE has registered and rotated domains to support public-facing dissemination infrastructure, replacing disrupted domains with new registrations.[4] |
| .003 | Acquire Infrastructure: Virtual Private Server |
VOID MANTICORE has utilized VPS solutions for C2.[1] |
||
| .004 | Acquire Infrastructure: Server |
VOID MANTICORE has leveraged backend servers within Iran.[3] |
||
| .006 | Acquire Infrastructure: Web Services |
VOID MANTICORE has obtained access to commercial VPN services to launch malicious activity.[1][10] VOID MANTICORE has also leveraged Starlink internet services.[1] VOID MANTICORE has used operator-controlled Telegram bots and channels as C2 infrastructure.[4] |
||
| Enterprise | T1595 | .002 | Active Scanning: Vulnerability Scanning |
VOID MANTICORE has scanned victim environments for susceptibility to vulnerability exploitation.[3] |
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
VOID MANTICORE has utilized HTTPS for communication to C2 domains.[11] |
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
VOID MANTICORE has stored collected data in a password protected compressed file prior to exfiltration.[11] |
| Enterprise | T1123 | Audio Capture |
VOID MANTICORE has gathered audio during a Zoom session.[11] |
|
| Enterprise | T1119 | Automated Collection |
VOID MANTICORE conducted large-scale data exfiltration in the Stryker operation, consistent with automated or scripted collection against enterprise systems.[4] |
|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
VOID MANTICORE has created Windows Registry entries to autorun stage two malware payloads to maintain persistence.[11] |
| Enterprise | T1110 | Brute Force |
VOID MANTICORE has conducted brute-force attempts against organizational VPN infrastructure.[1] |
|
| .001 | Password Guessing |
VOID MANTICORE has conducted password guessing to gain initial access.[4] |
||
| .004 | Credential Stuffing |
VOID MANTICORE has utilized credential stuffing attacks to obtain initial access to victim environments.[4] |
||
| Enterprise | T1651 | Cloud Administration Command |
VOID MANTICORE has abused built-in remote wipe or factory reset commands to wipe devices managed within an organization’s Cloud management solution impacting laptops, servers, and mobile devices.[2] |
|
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
VOID MANTICORE has utilized PowerShell to execute malware in victim environments.[3][11] During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.[8][7] |
| .003 | Command and Scripting Interpreter: Windows Command Shell |
During HomeLand Justice, threat actors used Windows batch files for persistence and execution.[8][7] |
||
| .006 | Command and Scripting Interpreter: Python |
VOID MANTICORE has utilized Python scripts to execute its malicious payloads.[11] |
||
| Enterprise | T1485 | Data Destruction |
VOID MANTICORE has conducted data wiping attacks on compromised systems.[1][10][3][2] VOID MANTICORE has also manually deleted files from compromised hosts, to include selecting all files and then deleting them.[1][3] |
|
| Enterprise | T1486 | Data Encrypted for Impact |
VOID MANTICORE has utilized legitimate disk encryption utilities to increase likelihood of encrypting system drives and reduce system recovery efforts.[1][3] During HomeLand Justice, threat actors used ROADSWEEP ransomware to encrypt files on targeted systems.[6][8][7] |
|
| Enterprise | T1213 | .002 | Data from Information Repositories: Sharepoint |
VOID MANTICORE has accessed victim’s public facing SharePoint servers and exfiltrated data.[3] |
| Enterprise | T1005 | Data from Local System |
VOID MANTICORE has collected cached data and files from within the victim environment.[10][3][11] |
|
| Enterprise | T1074 | Data Staged |
VOID MANTICORE has staged compressed files in specified locations prior to exfiltration over C2.[11] |
|
| Enterprise | T1587 | .001 | Develop Capabilities: Malware |
VOID MANTICORE has utilized custom-malware and wipers to include BiBi Wiper.[3] |
| Enterprise | T1686 | .003 | Disable or Modify System Firewall: Windows Host Firewall |
VOID MANTICORE has disabled Windows Defender protections to allow for follow-on activities within the compromised host.[1] |
| Enterprise | T1685 | Disable or Modify Tools |
During HomeLand Justice, threat actors modified and disabled components of endpoint detection and response (EDR) solutions including Microsoft Defender Antivirus.[7] |
|
| .001 | Disable or Modify Windows Event Log |
During HomeLand Justice, threat actors deleted Windows events and application logs.[7] |
||
| Enterprise | T1561 | .001 | Disk Wipe: Disk Content Wipe |
VOID MANTICORE has utilized a disk wiping utility to facilitate destructive actions on victim servers.[3] VOID MANTICORE has also utilized legitimate remote disk wiping commands.[10] |
| .002 | Disk Wipe: Disk Structure Wipe |
VOID MANTICORE has deployed custom wipers that overwrite system files and the host devices master boot records (MBR) to corrupt or destroy files.[1] During HomeLand Justice, threat actors used a version of ZeroCleare to wipe disk drives on targeted hosts.[8][7] |
||
| Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
VOID MANTICORE had utilized Group Policy logon scripts to distribute the malicious payloads to victim devices through the execution of a batch file.[1] |
| Enterprise | T1114 | .002 | Email Collection: Remote Email Collection |
VOID MANTICORE has gathered victim email-content from victim servers.[3] During HomeLand Justice, threat actors made multiple HTTP POST requests to the Exchange servers of the victim organization to transfer data.[8] |
| Enterprise | T1585 | .001 | Establish Accounts: Social Media Accounts |
VOID MANTICORE has created Telegram Accounts.[11] VOID MANTICORE has also leveraged online personas such as Handala Hack, Karma, and Homeland Justice on social media to include Telegram.[1][10][3] VOID MANTICORE has established and maintained social media accounts on Twitter/X and Telegram to amplify operational claims and stolen data disclosures.[4] |
| .002 | Establish Accounts: Email Accounts |
VOID MANTICORE has created email accounts to send threatening messages to victims to include ‘Handala_Team[@]outlook[.]com’.[3] |
||
| Enterprise | T1041 | Exfiltration Over C2 Channel |
VOID MANTICORE malware has exfiltrated collected data via Telegram bot C2 channels using encrypted communications.[4] During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.[8] |
|
| Enterprise | T1190 | Exploit Public-Facing Application |
VOID MANTICORE has exploited public facing vulnerabilities within victim environments to include SharePoint CVE-2019-0604.[3] For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.[8] |
|
| Enterprise | T1133 | External Remote Services |
VOID MANTICORE has leveraged public facing VPN infrastructure to gain initial access to victim environments.[1] |
|
| Enterprise | T1657 | Financial Theft |
VOID MANTICORE has conducted data exfiltration and posted stolen information on data leak sites for the purposes of financial and political extortion.[10][3] VOID MANTICORE has also sold stolen data to prospective buyers for cryptocurrency.[3] |
|
| Enterprise | T1589 | Gather Victim Identity Information |
VOID MANTICORE has gathered details on their intended victims to aid in social engineering efforts for leveraging tailored themes of attacks.[11] |
|
| Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
VOID MANTICORE has utilized PowerShell scripts that run without notifying the user of its execution to include |
| Enterprise | T1105 | Ingress Tool Transfer |
VOID MANTICORE has deployed additional payloads from dedicated C2 servers.[1][3][11] VOID MANTICORE has also downloaded legitimate tools and software from publicly available services.[1] VOID MANTICORE had utilized VeraCrypt a legitimate disk encrypting utility that was downloaded directly from the website.[1] During HomeLand Justice, threat actors used web shells to download files to compromised infrastructure.[7] |
|
| Enterprise | T1490 | Inhibit System Recovery |
VOID MANTICORE has deleted virtual machines directly from the virtualization platform.[1] |
|
| Enterprise | T1570 | Lateral Tool Transfer |
During HomeLand Justice, threat actors initiated a process named Mellona.exe to spread the ROADSWEEP file encryptor and a persistence script to a list of internal machines.[8] |
|
| Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
VOID MANTICORE has masqueraded as commonly used programs and services on Windows hosts.[11] |
| .005 | Masquerading: Match Legitimate Resource Name or Location |
VOID MANTICORE has masqueraded malicious payloads to resemble legitimate applications.[3][11] VOID MANTICORE has leveraged malicious payloads that use nomenclature associated with common applications that include Pictory, KeePass, WhatsApp, and Telegram.[11] During HomeLand Justice, threat actors renamed ROADSWEEP to GoXML.exe and ZeroCleare to cl.exe.[8][6] |
||
| Enterprise | T1046 | Network Service Discovery |
During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.[8][7] |
|
| Enterprise | T1027 | .015 | Obfuscated Files or Information: Compression |
VOID MANTICORE has compressed their payloads by leveraging zip files.[11] |
| Enterprise | T1588 | .001 | Obtain Capabilities: Malware |
VOID MANTICORE has developed or obtained trojanized applications used for persistent surveillance of targeted individuals.[4] |
| .002 | Obtain Capabilities: Tool |
VOID MANTICORE has obtained and utilized commercial VPN services, open-source software and publicly available offensive security tools to facilitate malicious activities.[1] During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.[8][7] |
||
| .003 | Obtain Capabilities: Code Signing Certificates |
During HomeLand Justice, threat actors used tools with legitimate code signing certificates. [8] |
||
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
VOID MANTICORE has dumped LSASS credentials using During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.[8] |
| Enterprise | T1566 | Phishing |
VOID MANTICORE has emailed victims threatening messages.[3] VOID MANTICORE has used phishing as an initial access vector.[4] |
|
| Enterprise | T1572 | Protocol Tunneling |
VOID MANTICORE has used tunneling tools to facilitate destructive attacks on compromised devices.[1] |
|
| Enterprise | T1219 | .002 | Remote Access Tools: Remote Desktop Software |
VOID MANTICORE has installed NetBird on victim devices to create a mesh network that facilitated control of several victim devices at once.[1] |
| Enterprise | T1021 | .001 | Remote Services: Remote Desktop Protocol |
VOID MANTICORE has used RDP to move laterally within the victim environment.[1] During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.[8][7] |
| .002 | Remote Services: SMB/Windows Admin Shares |
During HomeLand Justice, threat actors used SMB for lateral movement.[8][7] |
||
| Enterprise | T1113 | Screen Capture |
VOID MANTICORE has captured screen content during an active Zoom session.[11] |
|
| Enterprise | T1679 | Selective Exclusion |
VOID MANTICORE has avoided interacting with specific directories in order to reduce the likelihood of detection.[11] |
|
| Enterprise | T1505 | .003 | Server Software Component: Web Shell |
For HomeLand Justice, threat actors used .aspx webshells named pickers.aspx, error4.aspx, and ClientBin.aspx, to maintain persistence.[8][7] |
| Enterprise | T1684 | .001 | Social Engineering: Impersonation |
VOID MANTICORE has impersonated individuals familiar to the victim and technical support associated with social messaging services.[11] |
| Enterprise | T1072 | Software Deployment Tools |
VOID MANTICORE has leveraged legitimate built-in features of cloud-based management platforms to include mobile device management (MDM) and Remote Monitoring and Management (RMM) solutions.[10][2] VOID MANTICORE has also initiated built-in remote wipe instructions using a privileged account within Microsoft Intune.[10][2] |
|
| Enterprise | T1082 | System Information Discovery |
VOID MANTICORE has gathered system information and disseminated it back to C2.[11] |
|
| Enterprise | T1199 | Trusted Relationship |
VOID MANTICORE has targeted IT and service providers in an effort to obtain credentials, relying largely on compromised VPN accounts for initial access.[1] |
|
| Enterprise | T1552 | .002 | Unsecured Credentials: Credentials in Registry |
VOID MANTICORE had exported credentials from registry hives to include those stored in HKLM.[1] |
| Enterprise | T1204 | .002 | User Execution: Malicious File |
VOID MANTICORE has delivered malicious payloads that initiate through user execution to include interaction with a masqueraded file.[3][11] VOID MANTICORE has used trojanized application lures to induce targets into executing malware enabling persistent surveillance.[4] |
| Enterprise | T1078 | Valid Accounts |
VOID MANTICORE has leveraged valid accounts to log into VPN infrastructure.[1] VOID MANTICORE has used compromised valid credentials to gain access to management infrastructure and enterprise control systems.[4] VOID MANTICORE has also validated and tested authentication using compromised credentials prior to malicious actions.[1] During HomeLand Justice, threat actors used a compromised Exchange account to search mailboxes and create new Exchange accounts.[8] |
|
| .001 | Default Accounts |
During HomeLand Justice, threat actors used the built-in administrator account to move laterally using RDP and Impacket.[7] |
||
| .002 | Domain Accounts |
VOID MANTICORE has used previously compromised Domain Administrator credentials to maintain persistent access.[1] |
||
| .004 | Cloud Accounts |
VOID MANTICORE has leveraged privileged cloud accounts to access cloud-based management consoles to include Microsoft Intune.[2] VOID MANTICORE has also compromised existing accounts within the Microsoft Entra ID environment.[12] |
||
| Enterprise | T1125 | Video Capture |
VOID MANTICORE has collected video from compromised victim devices.[11] |
|
| Enterprise | T1102 | Web Service |
VOID MANTICORE has utilized Telegram API for C2.[3][11] |
|
| Enterprise | T1047 | Windows Management Instrumentation |
VOID MANTICORE has utilized WMIC to log into the victim host and create a process During HomeLand Justice, threat actors used WMI to modify Windows Defender settings.[7] |
|