Skip to main content
See every side of every news story
Published loading...Updated

Iran-linked hackers breach FBI director’s personal email, publish excerpts online

The Iran-linked Handala Hack Team leaked over 300 personal emails and photos from FBI Director Kash Patel’s account, citing retaliation for U.S. actions and a $10 million U.S. reward.

  • On Friday, the Justice Department confirmed Iran-linked hackers breached FBI Director Kash Patel's personal Gmail account. Handala Hack Team published photographs, a purported resume, and personal correspondence online.
  • Western researchers and U.S. prosecutors attribute Handala's operations to Iran's Ministry of Intelligence and Security, framing this breach within broader state-sponsored cyber activity targeting Western interests.
  • Data in the leaked cache dates from 2010 to 2019 and includes personal and work correspondence. While the FBI did not comment, a Justice Department official stated the material appeared authentic.
  • Potentially exposing sensitive communications, the incident threatens FBI operational security. This follows the Justice Department's seizure of four domains used by Handala, though the group quickly reappeared on new domains.
  • Intelligence officials continue to warn of potential retaliation by Tehran-linked actors following recent geopolitical tensions, as Handala recently targeted medical device maker Stryker on March 11, demonstrating persistent cyber threats.
Insights by Ground AI
Podcasts & Opinions

368 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 48% of the sources are Center
48% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

National Cyber Security broke the news in on Thursday, March 26, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal