SHARE
Facebook X Pinterest WhatsApp

Hacktivist Group Handala Publishes List of Israeli Tech Workers

A hacktivist group is using scraped public data and false claims to intimidate Israeli tech workers and crowdsource further doxxing.

Written By
thumbnail
Ken Underhill
Ken Underhill
Nov 24, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Handala, a Middle Eastern hacktivist group, has published a list of Israeli high-tech and aerospace professionals, pairing their names with false accusations and offering a bounty for more personal information.

While the group presents the individuals as criminals, early analysis shows no evidence supporting these claims and suggests that much of the data was simply harvested from public sources. 

“This activity represents a serious risk of cyber intimidation and emphasizes the need for vigilance and protective measures for those targeted,” said Trustwave researchers.

How Public Data Becomes a Weapon

This campaign is significant because it moves beyond broad political rhetoric and into direct attempts to harm private-sector employees. 

Although the list focuses on Israeli technology and aerospace professionals, the strategy employed by Handala — scraping public data, pairing it with accusations, and incentivizing further information gathering — can be replicated against targets in any country.

The group’s actions highlight how easily adversaries can leverage platforms like LinkedIn to identify employees, fabricate narratives, and crowdsource intelligence collection. 

Organizations relying on public-facing professional networks should take note of how quickly reputational harm and personal risk can spread once such data is misused.

How Handala Blends Truth With Fiction

A detailed review of the dataset shows that most of the information originated from LinkedIn and similar open-source platforms. 

However, the list contains inconsistencies indicating poor verification or intentional manipulation. 

Some professionals left their roles years ago, others currently occupy unrelated positions, and several entries cannot be traced to any real person. 

These irregularities suggest that Handala may be augmenting legitimate data with fabricated entries, placeholders, or unverifiable identities to increase the list’s apparent impact.

Despite these inconsistencies, the tone and intent of the publication signal a clear objective: intimidation. 

By labeling everyday professionals as criminals and encouraging followers to submit additional details, the group is attempting to crowdsource doxxing activities and gather personal intelligence that could be used in future campaigns. 

Even when information is inaccurate, the public association with hostile narratives can still damage reputations, invite harassment, and heighten psychological pressure on individuals and their families.

The Data Factors Enabling Handala’s Tactics

Handala’s approach demonstrates how easily public professional data can be repurposed for harmful objectives. 

The technique relies on three key factors:

  1. Accessibility of open-source data: Platforms like LinkedIn provide organizational charts, career history, and contact points that adversaries can scrape at scale.
  2. Credibility through partial truth: Even when datasets contain inaccuracies, the presence of legitimate profiles gives the overall list a veneer of authenticity.
  3. Crowdsourced intimidation: Offering financial rewards or public recognition encourages supporters to contribute more data, amplifying the threat surface.

These factors enable threat actors to create the illusion of intelligence-driven targeting, even when the underlying information is shallow, outdated, or false.  

Reducing Risk for Employees Named by Threat Actors

Organizations whose employees appear on such lists — or could be targeted in similar campaigns — should consider several protective measures:

  • Notify affected individuals so they understand the context and can take precautions.
  • Encourage stronger privacy settings on professional social networks to limit exposure of personal details.
  • Monitor for follow-on activity, including phishing attempts, impersonation, or social engineering using scraped data.
  • Coordinate with legal and threat intelligence teams to track dissemination of the dataset and report defamatory or harmful content.

These steps can help reduce the risk of harassment, identity misuse, or targeted cyberattacks.

Individuals as the New Geopolitical Targets

The Handala incident underscores a growing shift in geopolitically motivated cyber activity: adversaries are moving from targeting infrastructure to targeting individuals. 

As attackers increasingly weaponize open-source information, employees in sensitive sectors can become unwitting participants in broader political conflicts. 

By exploiting publicly accessible data, threat actors can apply pressure, spread misinformation, and undermine trust without relying on technically complex intrusions.

Rising Risks of Weaponized Personal Data

Handala’s publication demonstrates how easily personal and professional data can be manipulated to intimidate and discredit innocent people — a tactic that will continue as long as such information remains widely accessible. 

To reduce risk, individuals and organizations must strengthen data hygiene, heighten awareness, and monitor for emerging identity-focused threats. 

And as threat actors turn personal data into a weapon, deepfakes are emerging as a powerful tool for amplifying deception at scale.

Recommended for you...

Xillen Stealer Evolves With AI-Like Evasion and Broader Targeting
Ken Underhill
Nov 26, 2025
French Football Federation Hit by Breach via Compromised Admin Account
Ken Underhill
Nov 25, 2025
Critical vLLM Flaw Puts AI Systems at Risk of Remote Code Execution
Ken Underhill
Nov 25, 2025
HashiCorp Vault Bug Allows Attackers to Log In Without Credentials
Ken Underhill
Nov 25, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.