Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

Void Manticore: Iran’s Evolving Cyber Warfare Model

Red | Actor Report
Download PDF

Summary

Void Manticore: Iranian APT Group Combining Destruction with Psychological Warfare

Void Manticore is an Iranian advanced persistent threat group operating under the direction of Iran’s Ministry of Intelligence and Security (MOIS), tracked across vendors as Storm-0842, Banished Kitten, and operating under the public personas “Homeland Justice,” “Karma,” and “Handala.” First surfacing in July 2022 with destructive cyberattacks against Albania’s e-government systems, Void Manticore has evolved into a sophisticated hybrid warfare operation that seamlessly integrates technical destruction with information operations, targeted intimidation, and narrative control to achieve maximum geopolitical impact.

Void Manticore targets government agencies and critical infrastructure across Israel, United States, Albania, Jordan, and Gulf States, focusing on sectors including oil and gas, energy, telecommunications, defense, NGOs, media, think tanks, IT service providers, education, transportation, airlines, maritime, and healthcare. The group operates under multiple regional personas combining technical destruction with psychological warfare as a hallmark operational approach, deploying custom wiper malware including BiBi Wiper (named after Israeli Prime Minister Benjamin Netanyahu), Cl Wiper, and No-Justice Wiper.

A critical element of Void Manticore’s operational model is structured collaboration with Scarred Manticore, another MOIS-linked espionage group. This “handoff” workflow sees Scarred Manticore first breach targets to establish persistent access and conduct quiet data exfiltration, sometimes for over a year, before transferring control to Void Manticore when a decision is made to shift from intelligence collection to destruction. This partnership allows Iran to maintain espionage access while reserving the option to weaponize it during geopolitical escalations, a procedure observed against both Albania in 2022 and Israel from 2023-2026, demonstrating Iran’s mature, process-driven model of modern hybrid warfare.

Actor Details

Void Manticore Origins and Albania Campaign (2022)

Void Manticore is an Iranian advanced persistent threat group operating under the direction of Iran’s Ministry of Intelligence and Security (MOIS), tracked across security vendors as Storm-0842 and BANISHED KITTEN. The Void Manticore group first surfaced in July 2022 with a destructive cyberattack against Albania’s e-government systems under the persona “Homeland Justice,” strategically timed to disrupt a conference of the Iranian opposition group MEK (Mujahedin-e-Khalq).

Iranian actors operating as Void Manticore had maintained access to Albanian networks for approximately 14 months before striking, deploying custom wipers including Cl Wiper and No-Justice to cripple government infrastructure. A second Void Manticore wave targeted Albanian border systems in September 2022 following Albania’s severing of diplomatic ties with Iran, with stolen data publicly leaked on Telegram to amplify psychological impact.

Void Manticore Operational Model: Multiple Personas and Psychological Warfare

The Void Manticore group operates under multiple regional personas including “Homeland Justice” for Albania and “Karma” for Israel, combining technical destruction with psychological warfare as a hallmark operational approach. A critical element of Void Manticore’s operational model is its structured collaboration with Scarred Manticore, another MOIS-linked espionage group.

This Void Manticore “handoff” workflow sees Scarred Manticore first breach targets to establish persistent access and conduct quiet data exfiltration, sometimes for over a year, before transferring control to Void Manticore when a decision is made to shift from intelligence collection to destruction. This partnership allows Iran to maintain espionage access while reserving the option to weaponize it during geopolitical escalations, a procedure observed against both Albania in 2022 and Israel from 2023-2026.

Void Manticore Pivot to Israel: BiBi Wiper and Karma Persona (2023)

Following the October 2023 Israel-Hamas conflict, Void Manticore pivoted aggressively toward Israeli organizations under the persona “Karma,” claiming attacks against more than 40 entities, though the verified impact of many claims remains unclear. The Void Manticore group deployed its signature BiBi Wiper malware, named after Israeli Prime Minister Benjamin Netanyahu, in Windows and Linux variants to corrupt files while appending the “.BiBi” extension. Newer BiBi Wiper variants evolved to target disk partition tables directly, complicating data restoration efforts.

These Void Manticore destructive operations were consistently paired with public data leaks on Telegram to amplify psychological impact, demonstrating the group’s integration of technical destruction with information warfare operations.

Handala Persona: Void Manticore’s Most Sophisticated Evolution (Late 2023)

In late 2023, the Void Manticore group adopted its most sophisticated persona yet: Handala, a name borrowed from a Palestinian refugee cartoon symbol to create moral legitimacy while complicating Iranian attribution. Under this Handala branding, Void Manticore expanded into cognitive warfare, targeting personal devices of aides and family members to indirectly access senior Israeli decision-makers. Their “RedWanted” (also known as “Saturday Files”) campaign doxed personal details of Israelis in defense and media sectors while offering financial rewards for information.

Technically, the Void Manticore group demonstrated significant adaptability through campaigns attributed to the cluster that used commercial infostealers disguised as legitimate software updates, Telegram account takeover via session hijacking and SIM swapping, and attempts to mask destructive payloads as security software updates.

Void Manticore Targeting Expansion and Starlink Exploitation (2024-2026)

Between 2024 and 2026, Void Manticore targeting broadened to include NGOs and Western think tanks, with leak publication evolving into a deliberately planned phase of the attack lifecycle. Since mid-January 2026, the Void Manticore group has exploited Starlink terminals smuggled into Iran via black markets to maintain operations during government-imposed internet blackouts, demonstrating operational resilience.

Current Void Manticore Operations Post-Epic Fury (February 2026)

In the current escalation following Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel) in late February 2026, Handala (Void Manticore) remains active, claiming attacks on Israeli energy companies and Jordanian fuel infrastructure. However, with Iran’s internet connectivity below 4%, researchers assess that near-term sophisticated Void Manticore operations from within Iran are likely constrained, with much observed activity being opportunistic.

Void Manticore’s evolution from Homeland Justice through Karma to Handala represents a mature, process-driven model of modern hybrid warfare, seamlessly integrating technical destruction with information operations, targeted intimidation, and narrative control to achieve maximum geopolitical impact for Iranian interests.

Recommendations

Patch Internet-Facing Systems to Block Void Manticore Initial Access

Prioritize patching known exploited vulnerabilities, especially CVE-2019-0604 in Microsoft SharePoint, which Void Manticore uses for initial access. Regularly update all internet-facing applications, VPN gateways, and remote access solutions to eliminate entry points that enable Void Manticore destructive attacks.

Deploy EDR with Void Manticore Wiper-Specific Detection Rules

Void Manticore’s post-access TTPs are relatively unsophisticated and detectable by modern endpoint security. Configure EDR to detect known wiper behaviors including mass file corruption, partition table manipulation, “.BiBi” file extension changes, ElRawDisk driver abuse, and suspicious Mimikatz or batch file execution characteristic of BiBi Wiper, Cl Wiper, and No-Justice Wiper deployed by Void Manticore.

Maintain Offline, Immutable Backups Against Void Manticore Wipers

Wiper malware deployed by Void Manticore, including BiBi, Cl Wiper, and No Justice Wiper, are specifically designed to render data irrecoverable by corrupting files and disk partition tables. Maintain air-gapped, immutable backups of all critical data and systems, and regularly test restoration procedures through tabletop exercises. Particular attention should be given to protecting boot records and partition layouts, as Void Manticore wipers target disk structures to make data inaccessible even when underlying data remains intact.

Prepare for Void Manticore Combined Destruction and Influence Operations

Void Manticore’s attack lifecycle deliberately integrates data leaks and narrative amplification alongside technical destruction—leak publication is a planned phase, not a byproduct. Develop cross-functional response plans covering IT, legal, and communications teams for combined wiper-and-leak scenarios, and monitor Telegram channels and social media for Void Manticore’s active personas (Homeland Justice, Karma, Handala). The handoff from Scarred Manticore to Void Manticore leaves an extremely short window before destruction begins, so pre-authorized containment playbooks should be ready for immediate execution.

MITRE ATT&CK TTPs

Void Manticore APT Tactics, Techniques, and Procedures

Initial Access:

  • T1190: Exploit Public-Facing Application
  • T1078: Valid Accounts
  • T1566: Phishing

Execution:

  • T1059: Command and Scripting Interpreter
  • T1204: User Execution
  • T1204.002: Malicious File
  • T1047: Windows Management Instrumentation

Persistence:

  • T1505: Server Software Component
  • T1505.003: Web Shell
  • T1547: Boot or Logon Autostart Execution
  • T1547.001: Registry Run Keys
  • T1053: Scheduled Task/Job

Privilege Escalation:

  • T1078: Valid Accounts
  • T1078.002: Domain Accounts
  • T1068: Exploitation for Privilege Escalation

Defense Evasion:

  • T1562: Impair Defenses
  • T1562.001: Disable or Modify Tools
  • T1036: Masquerading
  • T1140: Deobfuscate/Decode Files or Information
  • T1070: Indicator Removal

Credential Access:

  • T1003: OS Credential Dumping
  • T1003.001: LSASS Memory
  • T1555: Credentials from Password Stores

Discovery:

  • T1087: Account Discovery
  • T1087.002: Domain Account
  • T1082: System Information Discovery
  • T1018: Remote System Discovery
  • T1069: Permission Groups Discovery
  • T1069.002: Domain Groups
  • T1016: System Network Configuration Discovery

Lateral Movement:

  • T1021: Remote Services
  • T1021.001: Remote Desktop Protocol
  • T1021.002: SMB/Windows Admin Shares
  • T1572: Protocol Tunneling

Collection:

  • T1114: Email Collection
  • T1005: Data from Local System
  • T1039: Data from Network Shared Drive

Command and Control:

  • T1071: Application Layer Protocol
  • T1071.001: Web Protocols
  • T1090: Proxy
  • T1105: Ingress Tool Transfer
  • T1572: Protocol Tunneling

Exfiltration:

  • T1041: Exfiltration Over C2 Channel
  • T1567: Exfiltration Over Web Service

Resource Development:

  • T1583: Acquire Infrastructure
  • T1583.006: Web Services
  • T1587: Develop Capabilities
  • T1587.001: Malware
  • T1586: Compromise Accounts
  • T1585: Establish Accounts
  • T1585.001: Social Media Accounts

Impact:

  • T1485: Data Destruction
  • T1561: Disk Wipe
  • T1561.001: Disk Content Wipe
  • T1561.002: Disk Structure Wipe
  • T1486: Data Encrypted for Impact
  • T1491: Defacement
  • T1491.002: External Defacement
  • T1489: Service Stop
  • T1529: System Shutdown/Reboot
  • T1531: Account Access Removal

Reconnaissance:

  • T1590: Gather Victim Network Information
  • T1589: Gather Victim Identity Information
  • T1589.001: Credentials

Indicators of Compromise (IOCs)

Void Manticore Malware File Hashes

SHA256 (selected):

  • 3c9dc8ada56adf9cebfc501a2d3946680dcb0534a137e2e27a7fcb5994cd9de6
  • 45bf0057b3121c6e444b316afafdd802d16083282d1cbfde3cdbf2a9d0915ace
  • D0C03D40772CD468325BBC522402F7B737F18B8F37A89BACC5C8A00C2B87BFC6
  • DEEAF85B2725289D5FC262B4F60DDA0C68AE42D8D46D0DC19B9253B451AEA25A

IPv4:

  • 64[.]176[.]169[.]22
  • 64[.]176[.]172[.]235
  • 64[.]176[.]172[.]165
  • 188[.]92[.]255[.]96
  • 188[.]92[.]255[.]57

File Names:

  • Error4.aspx
  • cl.exe
  • GoXML.exe
  • ClientBin.aspx
  • Pickers.aspx
  • mellona.exe
  • win.bat
  • bb.bat
  • disable_defender.exe
  • rwdsk.sys

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox