In Part 1, we explored how geopolitical tensions can translate into cyber operations targeting enterprise environments.

Groups like Handala operate in a space where cyber operations serve both disruption and narrative influence, combining technical intrusions with public messaging. But for security teams, the most important question is not political.

It is operational. If this campaign appeared inside your environment tomorrow, would your controls detect it before impact?

To answer that, we need to move from campaign analysis to detection engineering, and understand what telemetry and controls are actually required for those detections to work.


What Was Actually Confirmed

Let’s start with facts. Based on the public filing by Stryker Corporation:

AreaConfirmed Detail
DetectionIncident identified on March 11, 2026
ImpactDisruption to Microsoft environment
ResponseCyber response plan activated, external experts engaged
MalwareNo confirmed ransomware or traditional malware
StatusContained, investigation ongoing

That’s all we know for certain.

  • No confirmed entry point.
  • No confirmed toolset.
  • No confirmed payload.

Everything else must be treated carefully. Not as fact, but as informed assessment based on known threat behaviour. And that’s where intelligence starts to matter.


Threat Actor Snapshot

Before we go deeper, we anchor the discussion.

ThirdEye Intel Actor Tracking

  • Actor ID: TEI-ACT-001
  • Actor Name: Handala
  • Aliases: Void Manticore, Red Sandstorm, Banished Kitten
  • Origin: Iran, suspected MOIS alignment
  • Actor Class: Statecraft Actor
  • Primary Objective: Disruption and psychological signalling

Active since at least July 2023, Handala operates in a way most environments would not immediately flag.

  • Credential access.
  • Lateral movement.
  • Then impact.

Simple on paper. Difficult in practice.


Diamond Model View of the Campaign

The Diamond Model helps simplify what is otherwise messy.

ElementObserved Characteristics
AdversaryHandala / Void Manticore
InfrastructureVPN nodes, tunnelling infrastructure
CapabilityCredential dumping, RDP movement, destructive execution
VictimEnterprise environments, critical sectors

The key insight sits in the capability layer. This is not malware-heavy. This is behaviour-heavy. Which means detection must focus on what the attacker does, not what they run.


What Handala’s Tradecraft Suggests

The pattern is not complex. That’s the problem.

Behaviour CategoryObserved Pattern
Intrusion styleHands-on-keyboard
Access methodCredential-driven
ToolingNative / legitimate utilities
Network behaviourEncrypted tunnelling
ObjectiveControlled disruption

No noise at the start, just quiet movement which then leads to the part most teams underestimate – The sequence.


Behaviour Chain Observed in the Campaign

When you step back, the pattern becomes clear.

Nothing here is new. Which is exactly why it works.


From MITRE to Reality

The following techniques are mapped based on observed Handala tradecraft across different campaigns. Not all are publicly confirmed in the Stryker incident, but they represent the most realistic defensive lens.


MITRE + Detection + Telemetry + Mitigation

TechniqueIDBehaviourDetection SignalRequired TelemetryMitigation
Credential DumpingT1003.001LSASS memory accessSysmon Event 10LSASS monitoringPrivileged Process Integrity
RDP MovementT1021.001Remote login across hostsEvent 4624 Type 10Security logsMFA + segmentation
PowerShell ExecutionT1059.001Script executionEvent 4104Script block loggingExecution control
Protocol TunnellingT1572Encrypted internal tunnelNew interface + trafficNetwork + endpoint logsNetwork monitoring
Data DestructionT1485File deletion activityHigh-volume operationsEDR telemetryBackup + monitoring

MITRE is only useful when it answers one question: What would this look like in my logs?


Threat Hunting Package — Handala Tradecraft

This is where intelligence becomes usable.


Hunting Objectives

ObjectiveDescription
Detect credential access earlyIdentify LSASS interaction
Identify lateral movementTrack RDP behaviour
Detect hidden access pathsIdentify tunnelling activity
Detect impact stagingIdentify destructive execution

Hunting Hypotheses

HypothesisWhat to Look For
Credential access precedes movementLSASS access events
Tunnelling bypasses segmentationNew network interfaces
Lateral movement creates patternsRDP spikes
Destruction follows escalationPowerShell + file activity

Hunting Accelerators – Example Detection Logic

These examples are simplified and must be tuned for your environment.


LSASS Access Indicator

EventID: 10
TargetImage: lsass.exe
GrantedAccess: suspicious values

RDP Movement Pattern

EventID: 4624
LogonType: 10

Look for:

  • same user across multiple hosts
  • short time window
  • privileged accounts

PowerShell Suspicious Execution

Image: powershell.exe (note that the name can be changed like ps.exe)
CommandLine: encoded or obfuscated patterns

Network Tunnelling Behaviour

CommandLine contains: tun / tap / wireguard indicators

Behaviour Correlation Analytics – From Signals to Story

Single alerts don’t tell the story. Sequences do.


1. TEI-CORR-001 – Credential Access → Lateral Movement

Detection Logic

LSASS access detected
→ followed by RDP logon (LogonType 10)
→ within short time window (e.g. 15–30 mins)

What this indicates

  • credential dumping likely successful
  • attacker beginning lateral movement

Sample Sigma-style Concept

title: TEI-CORR-001 Credential Access Followed by RDP Movement
id: tei-corr-001
status: experimental
author: ThirdEye Intellogsource:
product: windowsdetection: lsass_access:
EventID: 10 rdp_logon:
EventID: 4624
LogonType: 10 timeframe: 30m condition: lsass_access followed_by rdp_logonlevel: critical

Why this works

  • LSASS access alone can be noisy.
  • RDP logon alone is normal.

👉 Together, they indicate progression.


2. TEI-CORR-002 – Lateral Movement → Administrative Execution

Detection Logic

Multiple RDP logons
→ followed by PowerShell execution
→ using elevated privileges

Sample Sigma-style Concept

title: TEI-CORR-002 RDP Movement Followed by PowerShell Execution
id: tei-corr-002
status: experimental
author: ThirdEye Intellogsource:
product: windowsdetection: rdp_activity:
EventID: 4624
LogonType: 10 powershell_exec:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe' suspicious_flags:
CommandLine|contains:
- '-enc'
- 'Invoke-Expression' timeframe: 20m condition: rdp_activity followed_by powershell_execlevel: high

Why this works

Movement followed by execution is a strong indicator of:

👉 attacker expanding control
👉 preparing for impact


3. TEI-CORR-003 – Hidden Access → Internal Expansion

Detection Logic

New network interface (tunnel)
→ followed by new internal connections
→ not seen in baseline behaviour

Sample Sigma-style Concept

title: TEI-CORR-003 Tunnel Establishment Followed by Internal Access
id: tei-corr-003
status: experimental
author: ThirdEye Intellogsource:
product: windowsdetection: tunnel_activity:
CommandLine|contains:
- 'tun'
- 'tap'
- 'wireguard' lateral_connection:
EventID: 4624 timeframe: 30m condition: tunnel_activity followed_by lateral_connectionlevel: high

Why this works

This identifies:

👉 segmentation bypass
👉 hidden internal foothold


4. TEI-CORR-004 – Pre-Impact Destructive Pattern

Detection Logic

Privilege escalation
→ PowerShell execution
→ high-volume file operations

Sample Sigma-style Concept

title: TEI-CORR-004 Pre-Destruction Behaviour Pattern
id: tei-corr-004
status: experimental
author: ThirdEye Intellogsource:
product: windowsdetection: powershell_exec:
Image|endswith:
- '\powershell.exe' file_activity:
EventID: 4663 timeframe: 15m condition: powershell_exec followed_by file_activitylevel: critical

Why this works

This is the last opportunity to detect:

👉 destructive intent before impact


Detection improves when we stop looking at events in isolation and start recognising behaviour as a sequence.


Detection Telemetry – Getting Specific

“Enable PowerShell logging” is not enough.


PowerShell Visibility

SignalEvent
Script Block Logging4104
Module Logging4103
TranscriptionFull session
AMSIEDR

Core Telemetry

BehaviourSourceEvent
LSASS accessSysmon10
Process executionSysmon1
RDP loginSecurity4624
RDP sessionTerminal Services1149
GPO changesAD5136

Microsoft / Intune Layer

AreaFocus
Device configurationPolicy changes
Compliance logsDevice anomalies
Application deploymentPayload delivery
Admin activityPrivilege misuse

Building a Detection Library from This Analysis

Threat intelligence should not end in a report. It should result in:

  • detection rules
  • telemetry improvements
  • hunting hypotheses

This is how intelligence becomes operational.


From Intelligence to Capability – Where SOCtane Fits

One of the biggest challenges is not intelligence. It is execution.

  • We map.
  • We detect.
  • We hunt.

But over time, it fragments. That’s where SOCtane comes in. Not as a dashboard. But as a threat management layer that connects:

  • intelligence
  • detection
  • telemetry
  • response

Every actor is translated into:

  • detection logic
  • telemetry requirements
  • hunting models
  • control gaps

This follows the ThirdEye Threat Management Model (TTMM):

Threat Intelligence
ATT&CK Mapping
Detection Engineering
Telemetry
Controls

SOCtane also uses AI to assist in:

  • identifying behaviour patterns
  • correlating signals
  • suggesting detection improvements

Not replacing analysts but accelerating them where it matters. Because speed without context creates noise. And context without speed creates risk.


Final Thought

Most attacks don’t begin with impact they begin quietly.

  • A process touches memory.
  • A login looks normal.
  • A session starts somewhere it shouldn’t.

Individually, nothing stands out. Together, they tell a story. The question is not whether the signals exist. It is whether we are seeing them early enough.


Because cybersecurity isn’t just a practice — it’s a reflection of character.


Discover more from Thirdeye Intel

Subscribe now to keep reading and get access to the full archive.

Continue reading